In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3 may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
References
Link | Resource |
---|---|
https://github.com/advisories/GHSA-vxpp-6299-mxw3 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
16 Oct 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CPE | cpe:2.3:a:php-fpm:php-fpm:*:*:*:*:*:*:*:* | |
First Time |
Php-fpm php-fpm
Php-fpm |
|
References | () https://github.com/advisories/GHSA-vxpp-6299-mxw3 - Third Party Advisory |
10 Oct 2024, 12:57
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
08 Oct 2024, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-08 04:15
Updated : 2024-10-16 18:35
NVD link : CVE-2024-8926
Mitre link : CVE-2024-8926
CVE.ORG link : CVE-2024-8926
JSON object : View
Products Affected
php-fpm
- php-fpm
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')