{"id":"CVE-2024-1874","details":"In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.","aliases":["BIT-libphp-2024-1874","BIT-php-2024-1874","BIT-php-min-2024-1874"],"modified":"2026-04-02T09:54:17.563673Z","published":"2024-04-29T04:15:07.580Z","related":["GHSA-pc52-254m-w9w7","HSEC-2024-0003","MGASA-2024-0132","openSUSE-SU-2024:13867-1"],"references":[{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZGWIK3HMBACERGB4TSBB2JUOMPYY2VKY/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KJZK3X6B7FBE32FETDSMRLJXTFTHKWSY/"},{"type":"WEB","url":"https://www.kb.cert.org/vuls/id/123335"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20240510-0009/"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2024/06/07/1"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/"},{"type":"ARTICLE","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2024/04/12/11"},{"type":"EVIDENCE","url":"https://www.vicarius.io/vsociety/posts/command-injection-vulnerability-in-php-on-windows-systems-cve-2024-1874-and-cve-2024-5585"},{"type":"EVIDENCE","url":"https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/php/php-src","events":[{"introduced":"381ba9f5d0edd0c9c8ec1dea7e21d513ad08b115"},{"fixed":"9119509142637005d079bcc2815ee43ec1c79524"},{"introduced":"70ee6c20ad97e02c2b8098aeea96fefbbc3ac5c2"},{"fixed":"d94fdf582e1fe4a1d85ded00a4c8b9935486c51d"},{"introduced":"d26068059e83fe40de3430a512471d194119bee0"},{"fixed":"9a9c7197c4774c80f622222b3dfa874e6dc44f67"}],"database_specific":{"versions":[{"introduced":"8.1.0"},{"fixed":"8.1.28"},{"introduced":"8.2.0"},{"fixed":"8.2.18"},{"introduced":"8.3.0"},{"fixed":"8.3.5"}]}}],"versions":["php-8.1.0","php-8.2.0","php-8.3.0"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"39"}]},{"events":[{"introduced":"0"},{"last_affected":"40"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-1874.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L"}]}