CERT-In Vulnerability Note
CIVN-2024-0183
Multiple Vulnerabilities in PHP
Original Issue Date:June 11, 2024
Severity Rating: HIGH
Software Affected
- PHP version prior to 8.3.8
- PHP version prior to 8.2.20
- PHP version prior to 8.1.29
Overview
Multiple vulnerabilities have been reported in PHP which could be exploited by a remote attacker to bypass security restrictions and execute arbitrary code on the targeted system.
Description
These vulnerabilities exist in PHP due to Argument Injection in PHP-CGI and Filter bypass in filter_var FILTER_VALIDATE_URL. A remote attacker could exploit these vulnerabilities by persuading a victim to visit specially crafted request.
Successful exploitation of these vulnerabilities could allow the remote attacker to bypass security restrictions and execute arbitrary code on the targeted system.
Solution
Apply appropriate updates as mentioned by the vendor:
https://www.php.net/ChangeLog-8.php
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/
Vendor Information
PHP
https://www.php.net/ChangeLog-8.php
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/
References
PHP
https://www.php.net/ChangeLog-8.php
https://devco.re/blog/2024/06/06/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability-en/
CVE Name
CVE-2024-1874
CVE-2024-4577
CVE-2024-5458
CVE-2024-5585
Disclaimer
The information provided herein is on "as is" basis, without warranty of any kind.
Contact Information
Email: info@cert-in.org.in Phone: +91-11-22902657
Postal address
Indian Computer Emergency Response Team (CERT-In) Ministry of Electronics and Information Technology Government of India Electronics Niketan 6, CGO Complex, Lodhi Road, New Delhi - 110 003 India
|