#VU91106 OS Command Injection in PHP


Published: 2024-06-07 | Updated: 2024-10-17

Vulnerability identifier: #VU91106

Vulnerability risk: Critical

CVSSv3.1: 9.4 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2024-4577

CWE-ID: CWE-78

Exploitation vector: Network

Exploit availability: Yes

Vulnerable software:
PHP
Universal components / Libraries / Scripting languages

Vendor: PHP Group

Description

The vulnerability allows a remote attacker to execute arbitrary shell commands on the target system.

The vulnerability exists due to improper input validation in PHP-CGI implementation. A remote attacker can send specially crafted HTTP request to the application and execute arbitrary OS commands on the system.

Note, the vulnerability exists due to incomplete fix for #VU4201 (CVE-2012-1823).

Mitigation
Install updates from vendor's website.

Vulnerable software versions

PHP: 8.2.0 - 8.2.19, 8.3.0 - 8.3.7, 8.1.0 - 8.1.28, 8.0.0 - 8.0.30, 7.4 - 7.4.33, 7.3 - 7.3.33, 7.2 - 7.2.34, 7.1 - 7.1.33, 7.0 - 7.0.33, 6.4, 6.3, 6.2, 6.1, 6.0, 5.5 - 5.5.38, 5.4 - 5.4.45, 5.3 - 5.3.29, 5.2 - 5.2.17, 5.6.0 - 5.6.40, 5.1 - 5.1.6, 5, 5.0 - 5.0.5


External links
http://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.


Latest bulletins with this vulnerability