In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
References
Configurations
No configuration.
History
13 Jun 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
12 Jun 2024, 02:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jun 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
References |
|
01 May 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
References |
|
29 Apr 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-04-29 04:15
Updated : 2024-06-13 04:15
NVD link : CVE-2024-1874
Mitre link : CVE-2024-1874
CVE.ORG link : CVE-2024-1874
JSON object : View
Products Affected
No product.
CWE
CWE-116
Improper Encoding or Escaping of Output