Trailing spaces in command names can lead to arbitrary command execution in PHP
CVE-2024-5585

7.7HIGH

Key Information:

Vendor
PHP Group
Status
Vendor
CVE Published:
9 June 2024

Summary

In specific versions of PHP, a vulnerability exists whereby insufficiently escaped command arguments in the proc_open() function can allow a malicious user to execute arbitrary commands within the Windows shell. This issue arises particularly when command names contain trailing spaces, leading to a failure in the intended fix for a related vulnerability. Attackers can exploit this weakness to manipulate the execution of commands, potentially compromising the server's security and integrity.

Affected Version(s)

PHP Windows 8.1.*

PHP Windows 8.1.* < 8.1.29

PHP Windows 8.2.* < 8.2.20

References

CVSS V3.1

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

Credit

tianstcht
.