This website uses cookies

Our website, platform and/or any sub domains use cookies to understand how you use our services, and to improve both your experience and our marketing relevance.

✨ Vultr and Linode are back on Cloudways! VIEW PLANS→

PHP Vulnerability Exposes Windows Servers to Remote Attacks

Updated on June 11, 2024

2 Min Read
PHP Vulnerability Exposes Windows Servers to Remote Attacks

Cybersecurity researchers have uncovered a new vulnerability in PHP that could allow attackers to execute malicious code remotely. Tracked as CVE-2024-4577, this CGI argument injection vulnerability affects all versions of PHP on Windows operating systems. It was inadvertently introduced while patching a previous flaw, CVE-2012-1823.

DEVCORE researchers explained that the vulnerability arose due to an oversight in the Best-Fit feature of encoding conversion within Windows: “While implementing PHP, the team did not notice the Best-Fit feature of encoding conversion within the Windows operating system.

via GIPHY

This oversight allows unauthenticated attackers to bypass the previous protection of CVE-2012-1823 using specific character sequences. Arbitrary code can be executed on remote PHP servers through the argument injection attack.”

A patch is now available, and the earliest fixed versions include 8.3.8, 8.2.20, and 8.1.29. Users are strongly advised to apply the patch immediately, as there is evidence of threat actors actively scanning the internet for vulnerable endpoints.

The Shadowserver Foundation has reported seeing hackers probing for this vulnerability since June 7th: “Attention! We see multiple IPs testing PHP/PHP-CGI CVE-2024-4577 (Argument Injection Vulnerability) against our honeypot sensors starting today,” the non-profit stated on X.

Additionally, DEVCORE warned that all XAMPP installations on Windows are vulnerable by default when set to use locales for Traditional Chinese, Simplified Chinese, or Japanese. Administrators should replace outdated PHP CGI with alternatives such as Mod-PHP, FastCGI, or PHP-FPM to mitigate the risk.

“This vulnerability is incredibly simple, but that’s also what makes it interesting,” DEVCORE researchers noted. “Who would have thought that a patch, which has been reviewed and proven secure for the past 12 years, could be bypassed due to a minor Windows feature?”

Users should act swiftly to update their systems and safeguard against potential attacks.

We also covered the PHP critical RCE flaw earlier this week. Users should act swiftly to update their systems and safeguard against potential attacks.

Share your opinion in the comment section. COMMENT NOW

Share This Article

Abdul Rehman

Abdul is a tech-savvy, coffee-fueled, and creatively driven marketer who loves keeping up with the latest software updates and tech gadgets. He's also a skilled technical writer who can explain complex concepts simply for a broad audience. Abdul enjoys sharing his knowledge of the Cloud industry through user manuals, documentation, and blog posts.

×

Thankyou for Subscribing Us!

×

Webinar: How to Get 100% Scores on Core Web Vitals

Join Joe Williams & Aleksandar Savkovic on 29th of March, 2021.

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Do you like what you read?

Get the Latest Updates

Share Your Feedback

Please insert Content

Thank you for your feedback!

Want to Experience the Cloudways Platform in Its Full Glory?

Take a FREE guided tour of Cloudways and see for yourself how easily you can manage your server & apps on the leading cloud-hosting platform.

Start my tour

CYBER WEEK SAVINGS

  • 0

    Days

  • 0

    Hours

  • 0

    Mints

  • 0

    Sec

GET OFFER

For 4 Months &
40 Free Migrations

For 4 Months &
40 Free Migrations

Upgrade Now