Arbitrary Command Execution Vulnerability in PHP Proc Open Function
CVE-2024-1874

9.4CRITICAL

Key Information:

Vendor
PHP Group
Status
Vendor
CVE Published:
29 April 2024

Badges

👾 Exploit Exists🟣 EPSS 42%📰 News Worthy

Summary

In PHP versions prior to 8.1.28, 8.2.18, and 8.3.5, a command injection vulnerability exists when using the proc_open() function with array syntax. This vulnerability arises from insufficient escaping, allowing an attacker to manipulate the arguments of the executed command. If the inputs are controlled by a malicious user, they can craft specific arguments that lead to the execution of arbitrary commands within the Windows shell environment. This poses a significant security risk to applications utilizing vulnerable versions of PHP.

Affected Version(s)

PHP Windows 8.1.*

PHP Windows 8.1.* < 8.1.28

PHP Windows 8.2.* < 8.2.18

News Articles

Critical PHP Vulnerabilities Let Attackers Inject Commands : Patch Now

Multiple vulnerabilities have been identified in PHP that are associated with Command Injection, Cookie Bypass, Account takeover and Denial

Mageia 2024-0132: php Security Advisory Updates | LinuxSecurity.com

Mageia 2024-0132: php Security Advisory Updates - MGASA-2024-0132Updated php packages fix security vulnerabilities Publication date: 13 Apr 2024 URL:

Critical PHP Vulnerabilities Exposed: Urgent Updates Needed to Safeguard Against Takeovers and Command Injection (CVE-2024-1874, CVE-2024-2756, CVE-2024-3096, CVE-2024-2757) - Daily Dark Web

Critical PHP Vulnerabilities Exposed: Urgent Updates Needed to Safeguard Against Takeovers and Command Injection (CVE-2024-1874, CVE-2024-2756, CVE-2024-3096, CVE-2024-2757) Discover the latest security threats and database leaks, including unauthorized VPN access and email breaches, in the cyber un...

References

EPSS Score

42% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • Vulnerability published

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by dailydarkweb.net

Credit

RyotaK
.
CVE-2024-1874 : Arbitrary Command Execution Vulnerability in PHP Proc Open Function | SecurityVulnerability.io