In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Metrics
Affected Vendors & Products
References
History
Mon, 19 Aug 2024 08:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Wed, 14 Aug 2024 01:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|

Status: PUBLISHED
Assigner: php
Published:
Updated: 2025-02-13T17:53:36.975Z
Reserved: 2024-05-06T22:21:01.742Z
Link: CVE-2024-4577

Updated: 2024-08-19T07:54:59.546Z

Status : Analyzed
Published: 2024-06-09T20:15:09.550
Modified: 2024-12-20T18:45:19.983
Link: CVE-2024-4577
