Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-1874— Command injection via array-ish $command parameter of proc_open()

CVSS 9.4 · Critical EPSS 63.38% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-1874

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Command injection via array-ish $command parameter of proc_open()
Source: NVD (National Vulnerability Database)
Vulnerability Description
In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
对输出编码和转义不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
PHP 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PHP是一种在服务器端执行的脚本语言。 PHP存在安全漏洞,该漏洞源于当使用带有数组语法的proc_open命令时,由于转义不足,如果执行命令的参数被恶意用户控制,则用户可以提供在Windows shell中执行任意命令的参数。以下版本受到影响:8.1.*版本至8.1.28之前版本、8.2.*版本至8.2.18之前版本、8.3.*版本至8.3.5之前版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
PHP GroupPHP 8.1.* ~ 8.1.28 -

II. Public POCs for CVE-2024-1874

#POC DescriptionSource LinkShenlong Link
1command injectionhttps://github.com/ox1111/-CVE-2024-1874-POC Details
2Proof Of Concept for CVE-2024-1874https://github.com/Tgcohce/CVE-2024-1874POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-1874

登录查看更多情报信息。

Same Patch Batch · PHP Group · 2024-04-29 · 4 CVEs total

CVE-2024-27577.5 HIGHPHP mb_encode_mimeheader runs endlessly for some inputs
CVE-2024-27566.5 MEDIUM__Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix
CVE-2024-30966.5 MEDIUMPHP function password_verify can erroneously return true when argument contains NUL

IV. Related Vulnerabilities

V. Comments for CVE-2024-1874

No comments yet


Leave a comment