Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-4577


In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.


Published

2024-06-09T20:15:09.550

Last Modified

2025-03-28T15:12:44.513

Status

Analyzed

Source

[email protected]

Severity

CVSSv3.1: 9.8 (CRITICAL)

Weaknesses
  • Type: Secondary
    CWE-78
  • Type: Primary
    CWE-78

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application php php < 8.1.29 Yes
Application php php < 8.2.20 Yes
Application php php < 8.3.8 Yes
Operating System microsoft windows - No
Operating System fedoraproject fedora 39 Yes
Operating System fedoraproject fedora 40 Yes

References