CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
99.6%
php81 is vulnerable to OS Command Injection. The vulnerability is due to misinterpretation of characters in the command line by the PHP CGI module when using certain code pages on Windows. This may allow a malicious user to pass options to the PHP binary, potentially revealing source code, running arbitrary PHP code on the server, and more.
www.openwall.com/lists/oss-security/2024/06/07/1
arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/
blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html
cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately
devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/
github.com/11whoami99/CVE-2024-4577
github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv
github.com/rapid7/metasploit-framework/pull/19247
github.com/watchtowrlabs/CVE-2024-4577
github.com/xcanwin/CVE-2024-4577-PHP-RCE
isc.sans.edu/diary/30994
labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/
lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/
lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/
secdb.alpinelinux.org/v3.19/community.yaml
security.netapp.com/advisory/ntap-20240621-0008/
www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/
www.php.net/ChangeLog-8.php#8.1.29
www.php.net/ChangeLog-8.php#8.2.20
www.php.net/ChangeLog-8.php#8.3.8