CVE-2024-1874

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
9.4 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
phpCNA
9.4 CRITICAL
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
CISA-ADPADP
---
---
CVEADP
---
---
Awaiting analysis
This vulnerability is currently awaiting analysis.
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
Debian logo
Debian Releases
Debian Product
Codename
php7.4
bullseye
7.4.33-1+deb11u5
fixed
bullseye (security)
7.4.33-1+deb11u8
fixed
php8.2
bookworm
8.2.28-1~deb12u1
fixed
bookworm (security)
8.2.28-1~deb12u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
php5
noble
dne
mantic
dne
jammy
dne
focal
dne
trusty
not-affected
php7.0
noble
dne
mantic
dne
jammy
dne
focal
dne
xenial
not-affected
php7.2
noble
dne
mantic
dne
jammy
dne
focal
dne
bionic
not-affected
php7.4
noble
dne
mantic
dne
jammy
dne
focal
not-affected
php8.1
noble
dne
mantic
dne
jammy
not-affected
focal
dne
php8.2
noble
dne
mantic
not-affected
jammy
dne
focal
dne
bionic
dne
xenial
dne
trusty
dne
php8.3
noble
not-affected
mantic
dne
jammy
dne
focal
dne
bionic
dne
xenial
dne
trusty
dne