In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
History

Wed, 16 Oct 2024 19:00:00 +0000

Type Values Removed Values Added
First Time appeared Php-fpm
Php-fpm php-fpm
CPEs cpe:2.3:a:php-fpm:php-fpm:*:*:*:*:*:*:*:*
Vendors & Products Php-fpm
Php-fpm php-fpm

Tue, 08 Oct 2024 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Php
Php php
CPEs cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Vendors & Products Php
Php php
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 08 Oct 2024 04:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in PHP that bypasses the fix implemented in CVE-2024-4577 when using a non-standard configuration of Windows codepages, only obtainable through the registry by pointing the ACP codepage to an OEM codepage. The required configuration is unlikely to occur in a real environment. In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Title php: PHP CGI Parameter Injection Vulnerability (CVE-2024-4577 bypass) PHP CGI Parameter Injection Vulnerability (CVE-2024-4577 bypass)
Weaknesses CWE-78
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 08 Oct 2024 01:45:00 +0000

Type Values Removed Values Added
Description A flaw was found in PHP that bypasses the fix implemented in CVE-2024-4577 when using a non-standard configuration of Windows codepages, only obtainable through the registry by pointing the ACP codepage to an OEM codepage. The required configuration is unlikely to occur in a real environment.
Title php: PHP CGI Parameter Injection Vulnerability (CVE-2024-4577 bypass)
References
Metrics threat_severity

None

threat_severity

Important


cve-icon MITRE

Status: PUBLISHED

Assigner: php

Published: 2024-10-08T03:48:53.628Z

Updated: 2024-10-08T13:52:37.171Z

Reserved: 2024-09-17T04:06:56.550Z

Link: CVE-2024-8926

cve-icon Vulnrichment

Updated: 2024-10-08T12:56:09.856Z

cve-icon NVD

Status : Analyzed

Published: 2024-10-08T04:15:10.637

Modified: 2024-10-16T18:35:59.500

Link: CVE-2024-8926

cve-icon Redhat

Severity : Important

Publid Date: 2024-10-07T00:00:00Z

Links: CVE-2024-8926 - Bugzilla