Lucene search

K
ubuntucveUbuntu.comUB:CVE-2024-5585
HistoryJun 09, 2024 - 12:00 a.m.

CVE-2024-5585

2024-06-0900:00:00
ubuntu.com
ubuntu.com
15
php versions 8.1.* before 8.1.29
8.2.* before 8.2.20
8.3.* before 8.3.8
proc_open() command
insufficient escaping
arbitrary commands
windows shell

CVSS3

9.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

AI Score

9.5

Confidence

High

EPSS

0.004

Percentile

75.0%

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before
8.3.8, the fix for CVE-2024-1874 does not work if the command name includes
trailing spaces. Original issue: when using proc_open() command with array
syntax, due to insufficient escaping, if the arguments of the executed
command are controlled by a malicious user, the user can supply arguments
that would execute arbitrary commands in Windows shell.

Notes

Author Note
mdeslaur This appears to be a Windows specific issue, marking as not-affected

CVSS3

9.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

AI Score

9.5

Confidence

High

EPSS

0.004

Percentile

75.0%