In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
History

Thu, 13 Feb 2025 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Php Group
Php Group php
CPEs cpe:2.3:a:php_group:php:8.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php_group:php:8.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php_group:php:8.3.0:*:*:*:*:*:*:*
Vendors & Products Php Group
Php Group php
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 13 Feb 2025 17:45:00 +0000

Type Values Removed Values Added
Description In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.  In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

Mon, 19 Aug 2024 08:30:00 +0000


cve-icon MITRE

Status: PUBLISHED

Assigner: php

Published:

Updated: 2025-02-13T17:32:26.388Z

Reserved: 2024-02-25T04:39:00.479Z

Link: CVE-2024-1874

cve-icon Vulnrichment

Updated: 2024-08-19T07:32:26.967Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-04-29T04:15:07.580

Modified: 2025-02-13T18:16:33.327

Link: CVE-2024-1874

cve-icon Redhat

Severity :

Publid Date: 2024-04-09T00:00:00Z

Links: CVE-2024-1874 - Bugzilla