The excerpt focuses on latest versions which is normal. When I better checked the CVE’S, they also concerned php from 5.0.0 up to 8.1.29 for CVE-2024-4577 and from 7.3.27 up to 7.4.33 (included) for CVE-2024-5458, so I was wrong. Sorry.
Vulnerability found
xxxxxxx
PHP vulnerabilities
PHP running: 7.4.33
PHP 7.4 <= 7.4.33 (unfixed)
[+] CVE-2024-4577
[en] In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use “Best-Fit” behavior to replace characters in command line given to Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
PHP 7.4 >= 7.4.15 – <= 7.4.33 (unfixed)
[+] CVE-2024-5458
[en] In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs (FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly.
Learn more about the WordPress Vulnerability Database API at WPVulnerability
-
This reply was modified 3 months, 3 weeks ago by Groovyx9.
-
This reply was modified 3 months, 3 weeks ago by Groovyx9.