CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
AI Score
Confidence
High
EPSS
Percentile
75.0%
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before
8.3.8, the fix for CVE-2024-1874 does not work if the command name includes
trailing spaces. Original issue: when using proc_open() command with array
syntax, due to insufficient escaping, if the arguments of the executed
command are controlled by a malicious user, the user can supply arguments
that would execute arbitrary commands in Windows shell.
Author | Note |
---|---|
mdeslaur | This appears to be a Windows specific issue, marking as not-affected |
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
LOW
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L
AI Score
Confidence
High
EPSS
Percentile
75.0%