Article Details
Scrape Timestamp (UTC): 2024-06-08 07:38:33.741
Source: https://thehackernews.com/2024/06/new-php-vulnerability-exposes-windows.html
Original Article Text
Click to Toggle View
New PHP Vulnerability Exposes Windows Servers to Remote Code Execution. Details have emerged about a new critical security flaw impacting PHP that could be exploited to achieve remote code execution under certain circumstances. The vulnerability, tracked as CVE-2024-4577, has been described as a CGI argument injection vulnerability affecting all versions of PHP installed on the Windows operating system. According to DEVCORE security researcher, the shortcoming makes it possible to bypass protections put in place for another security flaw, CVE-2012-1823. "While implementing PHP, the team did not notice the Best-Fit feature of encoding conversion within the Windows operating system," security researcher Orange Tsai said. "This oversight allows unauthenticated attackers to bypass the previous protection of CVE-2012-1823 by specific character sequences. Arbitrary code can be executed on remote PHP servers through the argument injection attack." Following responsible disclosure on May 7, 2024, a fix for the vulnerability has been made available in PHP versions 8.3.8, 8.2.20, and 8.1.29. DEVCORE has warned that all XAMPP installations on Windows are vulnerable by default when configured to use the locales for Traditional Chinese, Simplified Chinese, or Japanese. The Taiwanese company is also recommending that administrators move away from the outdated PHP CGI altogether and opt for a more secure solution such as Mod-PHP, FastCGI, or PHP-FPM. "This vulnerability is incredibly simple, but that's also what makes it interesting," Tsai said. "Who would have thought that a patch, which has been reviewed and proven secure for the past 12 years, could be bypassed due to a minor Windows feature?" The Shadowserver Foundation, in a post shared on X, said it has already detected exploitation attempts involving the flaw against its honeypot servers within 24 hours of public disclosure. watchTowr Labs said it was able to devise an exploit for CVE-2024-4577 and achieve remote code execution, making it imperative that users move quickly to apply the latest patches. "A nasty bug with a very simple exploit," security researcher Aliz Hammond said. "Those running in an affected configuration under one of the affected locales – Chinese (simplified, or traditional) or Japanese – are urged to do this as fast as humanly possible, as the bug has a high chance of being exploited en-mass due to the low exploit complexity." Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.
Daily Brief Summary
A new critical vulnerability in PHP, identified as CVE-2024-4577, allows for remote code execution on Windows servers.
The flaw involves a CGI argument injection that affects all PHP versions on Windows, bypassing protections added for an older vulnerability (CVE-2012-1823).
DEVCORE security researcher disclosed the vulnerability responsibly on May 7, 2024, with patches released in subsequent PHP updates.
Exploitation attempts have been detected soon after public disclosure, indicating active interest from malicious actors.
DEVCORE advises moving away from PHP CGI to more secure alternatives such as Mod-PHP, FastCGI, or PHP-FPM.
Patched PHP versions include 8.3.8, 8.2.20, and 8.1.29, addressing the vulnerability for users under affected configurations.
Particularly vulnerable are XAMPP installations on Windows configured for locales like Traditional Chinese, Simplified Chinese, or Japanese.
Immediate patch application is strongly recommended due to the simple exploit method and high potential for widespread exploitation.