CVE-2024-5585

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*

History

28 Jul 2024, 14:15

Type Values Removed Values Added
References
  • () https://security.netapp.com/advisory/ntap-20240726-0002/ -

Information

Published : 2024-06-09 19:15

Updated : 2024-07-28 14:15


NVD link : CVE-2024-5585

Mitre link : CVE-2024-5585

CVE.ORG link : CVE-2024-5585


JSON object : View

Products Affected

fedoraproject

  • fedora

php

  • php
CWE
CWE-116

Improper Encoding or Escaping of Output

CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')