CVE-2024-4577
Php
CVE-2024-4577: A critical PHP vulnerability affecting Windows systems using Apache and PHP-CGI. This flaw, present in PHP versions before 8.1.29, 8.2.20, and 8.3.8, allows attackers to exploit "Best-Fit" character conversion in Windows command lines. The high SVRS score of 99 indicates immediate action is required. Attackers can inject malicious PHP options, potentially revealing source code or executing arbitrary code on the server. With active exploits available and inclusion in the CISA KEV catalog, CVE-2024-4577 poses a significant risk. This vulnerability allows for serious security breaches, demanding prompt patching and mitigation. The vulnerability is associated with a known ransomware campaign use.
Description
CVE-2024-4577 is a critical vulnerability in PHP versions 8.1. before 8.1.29, 8.2. before 8.2.20, and 8.3.* before 8.3.8. It allows malicious users to pass options to the PHP binary being run, potentially revealing the source code of scripts or executing arbitrary PHP code on the server. The vulnerability has a CVSS score of 9.8 and an SVRS of 99, indicating its severe impact and urgency.
Key Insights
- Active Exploits: Active exploits have been published, making it imperative for organizations to patch their systems immediately.
- CISA Warning: The Cybersecurity and Infrastructure Security Agency (CISA) has issued a warning, urging organizations to take immediate action to mitigate the vulnerability.
- In the Wild: The vulnerability is actively exploited by hackers, highlighting the need for prompt remediation.
- Threat Actors: Known ransomware campaigns are exploiting this vulnerability, increasing the risk of data breaches and financial losses.
Mitigation Strategies
- Apply Patches: Install the latest security patches from PHP as soon as possible.
- Disable PHP-CGI: If possible, disable the PHP-CGI module on Windows systems to prevent exploitation.
- Restrict Access: Limit access to the PHP binary and ensure that only authorized users can execute PHP scripts.
- Use a Web Application Firewall (WAF): Implement a WAF to block malicious requests and protect against exploitation attempts.
Additional Information
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information.
Indicators of Compromise
No IOCs found for this CVE
Exploits
Title | Software Link | Date |
---|---|---|
cybersagor/CVE-2024-4577 | https://github.com/cybersagor/CVE-2024-4577 | 2024-07-05 |
dbyMelina/CVE-2024-4577 | https://github.com/dbyMelina/CVE-2024-4577 | 2024-06-09 |
BTtea/CVE-2024-4577-RCE-PoC | https://github.com/BTtea/CVE-2024-4577-RCE-PoC | 2024-11-06 |
PHP < 8.3.8 - Remote Code Execution (Unauthenticated) (Windows) | 2024-06-14 | |
PHP-CGI OS Command Injection Vulnerability | https://www.cisa.gov/search?g=CVE-2024-4577 | 2024-06-12 |
VictorShem/CVE-2024-4577 | https://github.com/VictorShem/CVE-2024-4577 | 2024-06-17 |
watchtowrlabs/CVE-2024-4577 | https://github.com/watchtowrlabs/CVE-2024-4577 | 2024-06-07 |
News
Social Media










Affected Software
Type | Vendor | Product | |
---|---|---|---|
App | Php | php |
Type | Vendor | Product | |
---|---|---|---|
OS | Fedoraproject | fedora |
References
Reference | Link |
---|---|
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
[email protected] | https://security.netapp.com/advisory/ntap-20240621-0008/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
AF854A3A-2127-422B-91AE-364DA2661108 | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
AF854A3A-2127-422B-91AE-364DA2661108 | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
AF854A3A-2127-422B-91AE-364DA2661108 | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/11whoami99/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/rapid7/metasploit-framework/pull/19247 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/watchtowrlabs/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
AF854A3A-2127-422B-91AE-364DA2661108 | https://isc.sans.edu/diary/30994 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://security.netapp.com/advisory/ntap-20240621-0008/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.1.29 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.2.20 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.3.8 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
[email protected] | https://security.netapp.com/advisory/ntap-20240621-0008/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
AF854A3A-2127-422B-91AE-364DA2661108 | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
AF854A3A-2127-422B-91AE-364DA2661108 | https://blog.talosintelligence.com/new-persistent-attacks-japan/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
AF854A3A-2127-422B-91AE-364DA2661108 | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/11whoami99/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/rapid7/metasploit-framework/pull/19247 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/watchtowrlabs/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
AF854A3A-2127-422B-91AE-364DA2661108 | https://isc.sans.edu/diary/30994 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://security.netapp.com/advisory/ntap-20240621-0008/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.1.29 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.2.20 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.3.8 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
[email protected] | https://security.netapp.com/advisory/ntap-20240621-0008/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
GITHUB | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
GITHUB | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
GITHUB | https://github.com/11whoami99/CVE-2024-4577 |
GITHUB | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
GITHUB | https://github.com/watchtowrlabs/CVE-2024-4577 |
GITHUB | https://isc.sans.edu/diary/30994 |
GITHUB | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
AF854A3A-2127-422B-91AE-364DA2661108 | https://blog.talosintelligence.com/new-persistent-attacks-japan/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
AF854A3A-2127-422B-91AE-364DA2661108 | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/11whoami99/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/rapid7/metasploit-framework/pull/19247 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/watchtowrlabs/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
AF854A3A-2127-422B-91AE-364DA2661108 | https://isc.sans.edu/diary/30994 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://security.netapp.com/advisory/ntap-20240621-0008/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.1.29 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.2.20 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.3.8 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
[email protected] | https://security.netapp.com/advisory/ntap-20240621-0008/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
CWE Details
CWE ID | CWE Name | Description |
---|---|---|
CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.