CVE-2024-8926

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-8926
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-8926.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-8926
Aliases
Related
Published
2024-10-08T04:15:10Z
Modified
2024-10-18T00:03:15.452277Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for  CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3  may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.

References

Affected packages

Debian:12 / php8.2

Package

Name
php8.2
Purl
pkg:deb/debian/php8.2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
8.2.24-1~deb12u1

Affected versions

8.*

8.2.5-2
8.2.7-1~deb12u1
8.2.7-1
8.2.10-1
8.2.10-2
8.2.12-1
8.2.16-1
8.2.16-2
8.2.17-1
8.2.18-1~deb12u1
8.2.18-1
8.2.20-1~deb12u1
8.2.20-2
8.2.20-3
8.2.21-1
8.2.23-1

Ecosystem specific

{
    "urgency": "not yet assigned"
}

Git / github.com/php/php-src

Affected ranges

Type
GIT
Repo
https://github.com/php/php-src
Events