CVE-2024-5585
Public on 2024-06-09
Modified on 2024-06-11
Description
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
Severity
CVSS v3 Base Score
See breakdown
Affected Packages
Platform | Package | Release Date | Advisory | Status |
---|---|---|---|---|
Amazon Linux 1 | php | Not Affected | ||
Amazon Linux 2 - Core | php | Not Affected | ||
Amazon Linux 2 - Php8.1 Extra | php | Not Affected | ||
Amazon Linux 2 - Php8.2 Extra | php | Not Affected | ||
Amazon Linux 1 | php56 | Not Affected | ||
Amazon Linux 2023 | php8.1 | Not Affected | ||
Amazon Linux 2023 | php8.2 | Not Affected |
CVSS Scores
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv3 | 7.7 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L |
NVD | CVSSv3 | 7.7 | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L |