HTTP: PHP CGI Argument Injection

This signature detects attempts to exploit a known vulnerability against PHP CGI Argument. A successful attack can lead to command injection and arbitrary code execution.

Extended Description

In PHP versions8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use "Best-Fit" behavior to replace characters in command line given toWin32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

Affected Products

Fedoraproject fedora

Short Name
HTTP:CTS:PHP-CGI-CMD-INJ
Severity
Major
Recommended
True
Recommended Action
Drop
Category
HTTP
Keywords
Argument CGI CVE-2024-4577 Injection PHP
Release Date
06/13/2024
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3795
False Positive
Unknown
Vendors

Fedoraproject

Found a potential security threat?