Lucene search

K
alpinelinuxAlpine Linux Development TeamALPINE:CVE-2024-5585
HistoryJun 09, 2024 - 7:15 p.m.

CVE-2024-5585

2024-06-0919:15:52
Alpine Linux Development Team
security.alpinelinux.org
4
php vulnerabilities
command injection
windows shell
proc_open()
cve-2024-5585
unix

9.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.2%

In PHP versionsย 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix forย CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue:ย when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.

OSVersionArchitecturePackageVersionFilename
Alpine3.19-communitynoarchphp81<ย 8.1.29-r0UNKNOWN
Alpine3.19-communitynoarchphp82<ย 8.2.20-r0UNKNOWN
Alpine3.19-communitynoarchphp83<ย 8.3.8-r0UNKNOWN

9.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

9 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

48.2%