CVE-2024-5585

EUVD-2024-46774
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
OS Command Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
7.7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
phpCNA
7.7 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
Base Score
CVSS 3.x
EPSS Score
Percentile: 74%
Affected Products (NVD)
VendorProductVersion
phpphp
8.1.29 <
𝑥
< 8.1.29
phpphp
8.2.20 <
𝑥
< 8.2.20
phpphp
8.3.8 <
𝑥
< 8.3.8
phpphp
8.1.0 ≤
𝑥
< 8.1.29
phpphp
8.2.0 ≤
𝑥
< 8.2.20
phpphp
8.3.0 ≤
𝑥
< 8.3.8
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
php7.4
bullseye
7.4.33-1+deb11u5
fixed
bullseye (security)
7.4.33-1+deb11u9
fixed
php8.2
bookworm
8.2.29-1~deb12u1
fixed
bookworm (security)
8.2.29-1~deb12u1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
php5
focal
dne
jammy
dne
mantic
dne
noble
dne
trusty
not-affected
php7.0
focal
dne
jammy
dne
mantic
dne
noble
dne
xenial
not-affected
php7.2
bionic
not-affected
focal
dne
jammy
dne
mantic
dne
noble
dne
php7.4
focal
not-affected
jammy
dne
mantic
dne
noble
dne
php8.1
focal
dne
jammy
not-affected
mantic
dne
noble
dne
php8.2
focal
dne
jammy
dne
mantic
not-affected
noble
dne
php8.3
focal
dne
jammy
dne
mantic
dne
noble
not-affected