First published: Thu Jun 06 2024(Updated: )
Fixed bug (Bypass of CVE-2024-4577, Parameter Injection Vulnerability). (CVE-2024-8926)
Credit: security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <8.3.8 | 8.3.8 |
PHP | <8.1.29 | 8.1.29 |
PHP | <8.3.12 | 8.3.12 |
PHP | ||
All of | ||
Any of | ||
PHP | >=8.1.0<8.1.29 | |
PHP | >=8.2.0<8.2.20 | |
PHP | >=8.3.0<8.3.8 | |
Microsoft Windows Operating System | ||
Red Hat Fedora | =39 | |
Red Hat Fedora | =40 |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-4577 is classified as a critical vulnerability affecting multiple PHP versions.
To fix CVE-2024-4577, upgrade PHP to versions 8.1.29, 8.2.20, or 8.3.8 or later.
CVE-2024-4577 affects PHP versions 8.1.0 to 8.1.28, 8.2.0 to 8.2.19, and 8.3.0 to 8.3.7.
The impact of CVE-2024-4577 includes potential parameter injection vulnerabilities leading to remote code execution.
Yes, CVE-2024-4577 can affect PHP installations in Fedora 39 and 40 that are running the vulnerable PHP versions.