漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
Command injection via array-ish $command parameter of proc_open() (bypass CVE-2024-1874 fix)
Vulnerability Description
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:L
Vulnerability Type
对输出编码和转义不恰当
Vulnerability Title
PHP 安全漏洞
Vulnerability Description
PHP是一种在服务器端执行的脚本语言。 PHP存在安全漏洞,该漏洞源于转义不足,如果执行命令的参数被恶意用户控制,用户可以提供参数在Windows shell中执行任意命令。以下版本受到影响:8.1至8.1.29之前版本,8.3至8.3.8之前版本,8.2至8.2.20之前版本。
CVSS Information
N/A
Vulnerability Type
N/A