We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-8927

cgi.force_redirect configuration is bypassable due to the environment variable collision



Description

In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.

Reserved 2024-09-17 | Published 2024-10-08 | Updated 2024-10-08 | Assigner php


HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Product status

Default status
unaffected

8.1.* before 8.1.30
affected

8.2.* before 8.2.24
affected

8.3.* before 8.3.12
affected

Credits

Owen Gong finder

RyotaK finder

References

github.com/...hp-src/security/advisories/GHSA-94p6-54jq-9mwp

cve.org (CVE-2024-8927)

nvd.nist.gov (CVE-2024-8927)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-8927

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.