Vulnerabilities/

PHP CGI Argument Injection RCE

Severity:
High

Description

In PHP, when configured as a CGI script (php-cgi), improper handling of certain query strings can allow remote attackers to execute arbitrary code. Specifically, query strings lacking an equals sign (=) or containing characters that may be misinterpreted due to system settings can enable attackers to pass command-line options to the PHP binary. This vulnerability, related to improper handling of command-line options or special characters, can lead to actions such as revealing source code or running arbitrary PHP code on the server.

Recommendation

To address this vulnerability, update PHP to the latest stable version.

References

Related Issues

Tags:
PHP
Command Injection
RCE
Input Validation
Injection
Anything's wrong? Let us know Last updated on September 25, 2024

This issue is available in SmartScanner Professional

See Pricing