{"id":37958,"date":"2025-03-17T11:15:56","date_gmt":"2025-03-17T15:15:56","guid":{"rendered":"https:\/\/www.yorku.ca\/uit\/?p=37958"},"modified":"2025-03-17T10:23:17","modified_gmt":"2025-03-17T15:23:17","slug":"php-cgi-vulnerability-cve-2024-4577","status":"publish","type":"post","link":"https:\/\/www.yorku.ca\/uit\/2025\/03\/php-cgi-vulnerability-cve-2024-4577\/","title":{"rendered":"PHP CGI Vulnerability (CVE-2024-4577)"},"content":{"rendered":"<div class=\"postie-post\">\n<div>\n<div class=\"WordSection1\">\n<p class=\"MsoNormal\"><o:p>&nbsp;<\/o:p><\/p>\n<div align=\"center\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"725\" style=\"width:544.0pt;background:#E0E0E0;border-collapse:collapse\">\n<tbody>\n<tr>\n<td style=\"border:solid windowtext 1.0pt;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\"><\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"600\" style=\"width:450.0pt;background:white;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td style=\"padding:0cm 0cm 0cm 0cm\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:6.75pt 13.5pt 6.75pt 13.5pt\">\n<p class=\"MsoNormal\"><span style=\"font-size:12.0pt;font-family:\"IBM Plex Sans\",sans-serif\"><img loading=\"lazy\" decoding=\"async\" width=\"688\" height=\"100\" style=\"width:7.1666in;height:1.0416in\" id=\"Picture_x0020_2\" src=\"https:\/\/www.yorku.ca\/uit\/wp-content\/uploads\/sites\/805\/2025\/03\/image001-17.png\" alt=\"A picture containing text  Description automatically generated\"><\/span><span style=\"font-size:12.0pt;font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\" align=\"center\" style=\"text-align:center;page-break-after:avoid\">  <span style=\"font-size:12.0pt;font-family:\"IBM Plex Sans\",sans-serif;mso-fareast-language:EN-US\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p class=\"MsoNormal\" align=\"center\" style=\"text-align:center;page-break-after:avoid\">  <b><span style=\"font-size:12.0pt;font-family:\"IBM Plex Sans\",sans-serif;color:black\">Service  <\/span><\/b><b><span style=\"font-size:12.0pt;font-family:\"IBM Plex Sans\",sans-serif\">Advisory&nbsp;<\/span><\/b><span style=\"font-size:12.0pt;font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size:12.0pt;font-family:\"IBM Plex Sans\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\">A critical PHP vulnerability (CVE-2024-4577), discovered last year is currently being exploited in the wild.  <\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white;mso-fareast-language:EN-US\">A successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary code on the vulnerable PHP server,   leading to complete system compromise and deliver malware including ransomware.<br \/>  <b><br \/>  <\/b><\/span><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black\">Severity level:<\/span><\/b><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:#242424\">&nbsp;<br \/>  <\/span><\/b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black\">CVSS Score: 9.8\/Critical<br \/>  <b><br \/>  Description<\/b>:<br \/>  <span style=\"background:white\">PHP is a widely used open-source scripting language commonly used for web development and commonly used on both Windows and Linux servers. PHP CGI is a method of running PHP scripts through the Common Gateway Interface (CGI) to   handle HTTP requests and generate dynamic web content. This vulnerability affects PHP installations on the Windows operating system, which either run PHP under CGI mode or expose the PHP binary.<br \/>  <\/span><b><br \/>  Affected Versions<\/b><\/span><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:#242424\">:<\/span><\/b><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\">PHP 8.3 versions earlier than 8.3.8<o:p><\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\">PHP 8.2 versions earlier than 8.2.20<o:p><\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\">PHP 8.1 versions earlier than 8.1.29<br \/>  <b><br \/>  Impact:<br \/>  <\/b><\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white;mso-fareast-language:EN-US\">This Vulnerability if exploited could lead to the execution of arbitrary code, a scenario with severe consequences for system integrity and   data security.<br \/>  <\/span><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black\"><br \/>  Resolution:<br \/>  <\/span><\/b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white;mso-fareast-language:EN-US\">Upgrade to the latest version.<br \/>  <\/span><b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black\"><br \/>  Reference:<\/span><\/b><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black;background:white\"><o:p><\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black\"><a href=\"https:\/\/www.cvedetails.com\/cve\/CVE-2024-4577\/\"><span style=\"color:#242424;text-decoration:none\">https:\/\/www.cvedetails.com\/cve\/CVE-2024-4577\/<\/span><\/a><\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:#242424\"><o:p><\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black\"><a href=\"https:\/\/www.cyber.gc.ca\/en\/alerts-advisories\/al25-001-mass-exploitation-critical-php-cgi-vulnerability-cve-2024-4577\">www.cyber.gc.ca\/en\/alerts-advisories\/al25-001-mass-exploitation-critical-php-cgi-vulnerability-cve-2024-4577<\/a><\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:#242424\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/critical-php-rce-vulnerability-mass-exploited-in-new-attacks\/\"><span style=\"color:#242424;text-decoration:none\">https:\/\/www.bleepingcomputer.com\/news\/security\/critical-php-rce-vulnerability-mass-exploited-in-new-attacks\/<\/span><\/a><o:p><\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:#242424\"><a href=\"https:\/\/www.php.net\/downloads.php\" target=\"_blank\"><span style=\"color:black;text-decoration:none\">https:\/\/www.php.net\/downloads.php<\/span><\/a><o:p><\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:#242424\"><a href=\"https:\/\/www.securityweek.com\/mass-exploitation-of-critical-php-vulnerability-begins\/\"><span style=\"color:#242424;text-decoration:none\">https:\/\/www.securityweek.com\/mass-exploitation-of-critical-php-vulnerability-begins\/<\/span><\/a><\/span><span style=\"font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<p class=\"elementtoproof\" style=\"background:white\"><span class=\"MsoHyperlink\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:#242424;text-decoration:none\"><a href=\"https:\/\/www.bitsight.com\/blog\/cve-2024-4577-windows-encoding-gone-wrong\"><span style=\"color:#242424;text-decoration:none\">https:\/\/www.bitsight.com\/blog\/cve-2024-4577-windows-encoding-gone-wrong<\/span><\/a><o:p><\/o:p><\/span><\/span><\/p>\n<p style=\"background:white\"><span style=\"font-family:\"IBM Plex Sans\",sans-serif;color:black\"><\/p>\n<p>  <\/span><span style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif;color:black\">UIT Information&nbsp;Security<\/span><span style=\"font-family:\"Calibri\",sans-serif;color:black\"><\/p>\n<p>  <\/span><span style=\"font-family:\"Calibri\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\"><b><span style=\"font-size:12.0pt;font-family:\"IBM Plex Sans\",sans-serif\">Contact<o:p><\/o:p><\/span><\/b><\/p>\n<p class=\"MsoNormal\" style=\"page-break-after:avoid\"><span style=\"font-size:12.0pt;font-family:\"IBM Plex Sans\",sans-serif\">IT Client Services at  <a href=\"mailto:askIT@yorku.ca\"><a href=\"mailto:askIT@yorku.ca\" >askIT@yorku.ca<\/a><\/a> or 416 736 5800 <span style=\"color:#548235\">  <o:p><\/o:p><\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<p class=\"MsoNormal\"><span style=\"font-size:12.0pt;font-family:\"IBM Plex Sans\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"600\" style=\"width:450.0pt;background:white;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\"><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"600\" style=\"width:450.0pt;background:#F2F2F2;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:0cm 0cm 0cm 0cm\">\n<table class=\"MsoNormalTable\" border=\"0\" cellspacing=\"0\" cellpadding=\"0\" width=\"100%\" style=\"width:100.0%;border-collapse:collapse\">\n<tbody>\n<tr>\n<td width=\"100%\" style=\"width:100.0%;padding:6.75pt 13.5pt 6.75pt 13.5pt\">\n<p class=\"MsoNormal\"><span style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\"><a href=\"https:\/\/www.yorku.ca\/about\/privacy-legal\/\" target=\"_blank\"><span lang=\"EN-US\">PRIVACY POLICY<\/span><\/a><\/span><span lang=\"EN-US\" style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\">&nbsp;|&nbsp;<\/span><span style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\"><a href=\"https:\/\/www.yorku.ca\" target=\"_blank\"><span lang=\"EN-US\">VISIT   WWW.YORKU.CA<\/span><\/a><span style=\"color:#505050\"><br \/>  This email was sent by: <b>York University, 4700 Keele Street, Toronto, Ontario M3J 1P3<\/b>  <\/span><o:p><\/o:p><\/span><\/p>\n<p class=\"MsoNormal\"><span style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif;color:#505050\">This email is viewed best in Microsoft Outlook for web&nbsp;<\/span><span style=\"font-size:10.0pt;font-family:\"IBM Plex Sans\",sans-serif\"><o:p><\/o:p><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table><\/div>\n<p class=\"MsoNormal\" style=\"margin-bottom:12.0pt\"><span style=\"font-family:\"Aptos\",sans-serif\"><o:p>&nbsp;<\/o:p><\/span><\/p><\/div>\n<\/p><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; &nbsp; Service Advisory&nbsp; &nbsp; A critical PHP vulnerability (CVE-2024-4577), discovered last year is currently being exploited in the wild. A successful exploitation of this vulnerability could allow an unauthenticated attacker to execute arbitrary code on the vulnerable PHP server, leading to complete system compromise and deliver malware including ransomware. Severity level:&nbsp; CVSS Score: 9.8\/Critical [&hellip;]<\/p>\n","protected":false},"author":212,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","footnotes":""},"categories":[29],"tags":[],"class_list":["post-37958","post","type-post","status-publish","format-standard","hentry","category-news"],"taxonomy_info":{"category":[{"value":29,"label":"News"}]},"featured_image_src_large":false,"author_info":{"display_name":"aalaily","author_link":"https:\/\/www.yorku.ca\/uit\/author\/aalaily\/"},"comment_info":"","category_info":[{"term_id":29,"name":"News","slug":"news","term_group":0,"term_taxonomy_id":3,"taxonomy":"category","description":"","parent":0,"count":485,"filter":"raw","cat_ID":29,"category_count":485,"category_description":"","cat_name":"News","category_nicename":"news","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/posts\/37958","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/comments?post=37958"}],"version-history":[{"count":0,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/posts\/37958\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/media?parent=37958"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/categories?post=37958"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.yorku.ca\/uit\/wp-json\/wp\/v2\/tags?post=37958"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}