First published: Mon Apr 29 2024(Updated: )
Fixed bug GHSA-9fcc-425m-g385 (Bypass of CVE-2024-1874). (CVE-2024-5585)
Credit: security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <8.2.20 | 8.2.20 |
PHP | <8.1.29 | 8.1.29 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1874 has a critical severity level due to its potential for command injection vulnerabilities.
To fix CVE-2024-1874, upgrade PHP to version 8.1.29 or later, or to version 8.2.20 or later.
CVE-2024-1874 affects PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, and 8.3.* before 8.3.5.
Yes, CVE-2024-1874 can be exploited remotely if an attacker can send crafted commands to the affected PHP code.
In the context of CVE-2024-1874, proc_open() is a PHP function that creates a process based on command arguments which may lack sufficient escaping, leading to vulnerabilities.