High Severity Vulnerability
This vulnerability has been rated as High severity. Immediate action is recommended.
CVE-2024-5585
HighVulnerability Description
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
CVSS Metrics
Common Vulnerability Scoring System
Vector String:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
Known Affected Software
57 configuration(s) from 2 vendor(s)
cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*
cpe:2.3:a:php:php:8.3.5:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.25:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.0:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.12:*:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.27:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.5:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.5:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.14:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.13:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.21:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.9:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.23:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.19:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.3.0:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.3.6:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.3.1:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.1:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.7:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:8.3.7:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.28:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.16:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.4:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.18:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.10:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.11:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.22:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.17:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.2:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.17:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.3:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.13:*:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.0:rc4:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.12:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.7:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.6:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.18:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.4:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.16:*:*:*:*:*:*:*
cpe:2.3:a:php:php:8.3.2:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.3.3:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:8.3.4:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.24:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.20:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.6:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.26:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.8:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.1.19:-:*:*:*:*:*:*
cpe:2.3:a:php:php:8.2.15:-:*:*:*:*:*:*
References & Resources
-
http://www.openwall.com/lists/oss-security/2024/06/07/1security@php.net Mailing List Third Party Advisory
-
https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385security@php.net Exploit Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/security@php.net Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/security@php.net
-
https://security.netapp.com/advisory/ntap-20240726-0002/security@php.net
-
http://www.openwall.com/lists/oss-security/2024/06/07/1af854a3a-2127-422b-91ae-364da2661108 Mailing List Third Party Advisory
-
https://github.com/php/php-src/security/advisories/GHSA-9fcc-425m-g385af854a3a-2127-422b-91ae-364da2661108 Exploit Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/af854a3a-2127-422b-91ae-364da2661108 Third Party Advisory
-
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/af854a3a-2127-422b-91ae-364da2661108
-
https://security.netapp.com/advisory/ntap-20240726-0002/af854a3a-2127-422b-91ae-364da2661108
-
https://www.vicarius.io/vsociety/posts/command-injection-vulnerability-in-php-on-windows-systems-cve-2024-1874-and-cve-2024-5585af854a3a-2127-422b-91ae-364da2661108
Severity Details
Weakness Type (CWE)
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- Description
- The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a…
- Exploit Likelihood
- High
- Typical Severity
- High
- OWASP Top 10
- A03:2021-Injection
- Abstraction Level
- Base
Key Information
- Published Date
- June 09, 2024
