CVE-2024-4577
Php
CVE-2024-4577 is a critical vulnerability in PHP affecting Windows systems using Apache and PHP-CGI. This flaw allows a malicious user to execute arbitrary PHP code by manipulating command-line arguments. The SVRS score of 99 indicates an extremely high risk, demanding immediate action. Specifically, when certain code pages are enabled, Windows' "Best-Fit" behavior can be exploited to inject PHP options. This could lead to source code disclosure or complete server compromise. Given its presence "In The Wild," publicly available exploits, inclusion in the CISA KEV catalog, and association with known ransomware campaigns, patching is crucial. Failing to address CVE-2024-4577 can result in severe security breaches and significant data loss.
Indicators of Compromise
Type | Indicator | Date | |
---|---|---|---|
HASH | 0440b3fbc030233b4e9c6748eba27e4d | 2024-06-18 | |
HASH | 6bef5498c56691553dc95917ff103f5e | 2024-06-18 | |
IP | 2.58.15.118 | 2024-06-18 | |
HASH | 2545129335dbd7263bc3b3337f919fd6 | 2024-07-11 | |
HASH | 262d0c43b9204fdfc4a575bc85d7f019 | 2024-07-11 | |
HASH | 5a9ece853305022172ea59f17802bca4 | 2024-07-11 | |
HASH | 3e2bbe23c90fe761145a984c73aec384cd400f46 | 2024-07-11 |
Exploits
Title | Software Link | Date |
---|---|---|
Junp0/CVE-2024-4577 | https://github.com/Junp0/CVE-2024-4577 | 2024-06-07 |
11whoami99/CVE-2024-4577 | https://github.com/11whoami99/CVE-2024-4577 | 2024-06-07 |
watchtowrlabs/CVE-2024-4577 | https://github.com/watchtowrlabs/CVE-2024-4577 | 2024-06-07 |
manuelinfosec/CVE-2024-4577 | https://github.com/manuelinfosec/CVE-2024-4577 | 2024-06-08 |
zomasec/CVE-2024-4577 | https://github.com/zomasec/CVE-2024-4577 | 2024-06-08 |
ZephrFish/CVE-2024-4577-PHP-RCE | https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE | 2024-06-08 |
ZephrFish/CVE-2024-4577-PoC | https://github.com/ZephrFish/CVE-2024-4577-PoC | 2024-06-08 |
News
Social Media










Affected Software
Type | Vendor | Product | |
---|---|---|---|
App | Php | php |
Type | Vendor | Product | |
---|---|---|---|
OS | Fedoraproject | fedora |
References
Reference | Link |
---|---|
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
[email protected] | https://security.netapp.com/advisory/ntap-20240621-0008/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
AF854A3A-2127-422B-91AE-364DA2661108 | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
AF854A3A-2127-422B-91AE-364DA2661108 | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
AF854A3A-2127-422B-91AE-364DA2661108 | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/11whoami99/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/rapid7/metasploit-framework/pull/19247 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/watchtowrlabs/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
AF854A3A-2127-422B-91AE-364DA2661108 | https://isc.sans.edu/diary/30994 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://security.netapp.com/advisory/ntap-20240621-0008/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.1.29 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.2.20 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.3.8 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
[email protected] | https://security.netapp.com/advisory/ntap-20240621-0008/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
AF854A3A-2127-422B-91AE-364DA2661108 | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
AF854A3A-2127-422B-91AE-364DA2661108 | https://blog.talosintelligence.com/new-persistent-attacks-japan/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
AF854A3A-2127-422B-91AE-364DA2661108 | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/11whoami99/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/rapid7/metasploit-framework/pull/19247 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/watchtowrlabs/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
AF854A3A-2127-422B-91AE-364DA2661108 | https://isc.sans.edu/diary/30994 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://security.netapp.com/advisory/ntap-20240621-0008/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.1.29 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.2.20 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.3.8 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
[email protected] | https://security.netapp.com/advisory/ntap-20240621-0008/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
GITHUB | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
GITHUB | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
GITHUB | https://github.com/11whoami99/CVE-2024-4577 |
GITHUB | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
GITHUB | https://github.com/watchtowrlabs/CVE-2024-4577 |
GITHUB | https://isc.sans.edu/diary/30994 |
GITHUB | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
AF854A3A-2127-422B-91AE-364DA2661108 | https://blog.talosintelligence.com/new-persistent-attacks-japan/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
AF854A3A-2127-422B-91AE-364DA2661108 | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/11whoami99/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/rapid7/metasploit-framework/pull/19247 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/watchtowrlabs/CVE-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
AF854A3A-2127-422B-91AE-364DA2661108 | https://isc.sans.edu/diary/30994 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://security.netapp.com/advisory/ntap-20240621-0008/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.1.29 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.2.20 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.php.net/ChangeLog-8.php#8.3.8 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-argument-injection-to-rce-cve-2024-4577 |
AF854A3A-2127-422B-91AE-364DA2661108 | https://www.vicarius.io/vsociety/posts/php-cgi-os-command-injection-vulnerability-cve-2024-4577 |
[email protected] | http://www.openwall.com/lists/oss-security/2024/06/07/1 |
[email protected] | https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/ |
[email protected] | https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html |
[email protected] | https://cert.be/en/advisory/warning-php-remote-code-execution-patch-immediately |
[email protected] | https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/ |
[email protected] | https://github.com/11whoami99/CVE-2024-4577 |
[email protected] | https://github.com/php/php-src/security/advisories/GHSA-3qgc-jrrr-25jv |
[email protected] | https://github.com/rapid7/metasploit-framework/pull/19247 |
[email protected] | https://github.com/watchtowrlabs/CVE-2024-4577 |
[email protected] | https://github.com/xcanwin/CVE-2024-4577-PHP-RCE |
[email protected] | https://isc.sans.edu/diary/30994 |
[email protected] | https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ |
[email protected] | https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ |
[email protected] | https://security.netapp.com/advisory/ntap-20240621-0008/ |
[email protected] | https://www.imperva.com/blog/imperva-protects-against-critical-php-vulnerability-cve-2024-4577/ |
[email protected] | https://www.php.net/ChangeLog-8.php#8.1.29 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.2.20 |
[email protected] | https://www.php.net/ChangeLog-8.php#8.3.8 |
CWE Details
CWE ID | CWE Name | Description |
---|---|---|
CWE-78 | Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') | The software constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component. |
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.