CVE-2024-1874

critical

Description

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

References

https://securityaffairs.com/161785/security/batbadbut-flaw-programming-languages.html

https://www.securityweek.com/batbadbut-command-injection-vulnerability-affects-multiple-programming-languages/

https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7

Details

Source: Mitre, NVD

Published: 2024-04-29

Updated: 2024-04-29

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.4

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Severity: Critical