Latest PHP Weakness Reveals Windows Servers to Remote Code Execution Risk

Jun 08, 2024NewsroomWeakness / Coding

Information has surfaced regarding a recent critical vulnerability affecting PHP that could be leveraged to accomplish remote code execution in specific scenarios.

New PHP Vulnerability Exposes Windows Servers to Remote Code Execution

Jun 08, 2024NewsroomWeakness / Coding

New PHP Vulnerability Exposes Windows Servers to Remote Code Execution

Information has surfaced regarding a recent critical vulnerability affecting PHP that could be leveraged to accomplish remote code execution in specific scenarios.

The flaw, known as CVE-2024-4577, is identified as a CGI parameter insertion vulnerability impacting all editions of PHP installed on the Windows OS.

As per DEVCORE security expert, this shortfall enables the bypassing of protections implemented for another security vulnerability, CVE-2012-1823.

Cybersecurity

“During the implementation of PHP, the team overlooked the Optimal-Fit characteristic of encoding conversion within the Windows OS,” mentioned security researcher Orange Tsai asserted.

“This negligence allows unauthenticated intruders to circumvent the previous safeguard of CVE-2012-1823 by employing specific character sequences. Malicious code can be executed on distant PHP servers via the argument insertion assault.”

After a responsible disclosure on May 7, 2024, a remedy for the vulnerability has been released in PHP versions 8.3.8, 8.2.20, and 8.1.29.

DEVCORE has cautioned that all XAMPP installations on Windows are vulnerable if configured to utilize the locales for Traditional Chinese, Simplified Chinese, or Japanese.

The Taiwanese firm is further suggesting that administrators transition away from the outdated PHP CGI and instead select a more secure solution like Mod-PHP, FastCGI, or PHP-FPM.

“This flaw is remarkably simple, but that’s also what renders it intriguing,” Tsai expressed. “Who would have speculated that a patch, which has been vetted and declared secure for the past 12 years, could be evaded due to a minor Windows feature?”

The Shadowserver Foundation, in a post shared on X, revealed that exploitation attempts leveraging the flaw against its honeypot servers were already detected within 24 hours of public disclosure.

Cybersecurity

watchTowr Labs mentioned that they successfully crafted an exploit for CVE-2024-4577 and achieved remote code execution, stressing the urgency for users to promptly apply the latest patches.

“A harmful glitch with an extremely straightforward exploit,” security expert Aliz Hammond conveyed.

“Those running in an affected setup under one of the impacted locales – Chinese (simplified, or traditional) or Japanese – are advised to act swiftly, as the glitch has a substantial likelihood of being broadly exploited due to the low exploit complexity.”

Found this article captivating? Follow us on Twitter and LinkedIn to read more unique content we publish.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.