Description
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
INFO
Published Date :
2024-06-09T19:42:36.464Z
Last Modified :
2025-10-21T23:05:16.089Z
Source :
php
AFFECTED PRODUCTS
The following products are affected by CVE-2024-4577 vulnerability.
| Vendors | Products |
|---|---|
| Fedoraproject |
|
| Microsoft |
|
| Php |
|
| Php Group |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2024-4577.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact