CVE-2024-1874

In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
References
Link Resource
http://www.openwall.com/lists/oss-security/2024/04/12/11 Mailing List
http://www.openwall.com/lists/oss-security/2024/06/07/1 Mailing List
https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7 Exploit Vendor Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ Mailing List
https://security.netapp.com/advisory/ntap-20240510-0009/ Third Party Advisory
http://www.openwall.com/lists/oss-security/2024/04/12/11 Mailing List
http://www.openwall.com/lists/oss-security/2024/06/07/1 Mailing List
https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7 Exploit Vendor Advisory
https://lists.fedoraproject.org/archives/list/[email protected]/message/KJZK3X6B7FBE32FETDSMRLJXTFTHKWSY/
https://lists.fedoraproject.org/archives/list/[email protected]/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/ Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/ Mailing List
https://lists.fedoraproject.org/archives/list/[email protected]/message/ZGWIK3HMBACERGB4TSBB2JUOMPYY2VKY/
https://security.netapp.com/advisory/ntap-20240510-0009/ Third Party Advisory
https://www.kb.cert.org/vuls/id/123335
https://www.vicarius.io/vsociety/posts/command-injection-vulnerability-in-php-on-windows-systems-cve-2024-1874-and-cve-2024-5585 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:39:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*

History

04 Nov 2025, 19:16

Type Values Removed Values Added
References
  • () https://lists.fedoraproject.org/archives/list/[email protected]/message/KJZK3X6B7FBE32FETDSMRLJXTFTHKWSY/ -
  • () https://lists.fedoraproject.org/archives/list/[email protected]/message/ZGWIK3HMBACERGB4TSBB2JUOMPYY2VKY/ -
  • () https://www.kb.cert.org/vuls/id/123335 -

Information

Published : 2024-04-29 04:15

Updated : 2025-11-04 19:16


NVD link : CVE-2024-1874

Mitre link : CVE-2024-1874

CVE.ORG link : CVE-2024-1874


JSON object : View

Products Affected

php

  • php

fedoraproject

  • fedora
CWE
CWE-116

Improper Encoding or Escaping of Output