CVE-2024-8927

NameCVE-2024-8927
DescriptionIn PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3920-1, DSA-5780-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php7.4 (PTS)bullseye7.4.33-1+deb11u5vulnerable
bullseye (security)7.4.33-1+deb11u6fixed
php8.2 (PTS)bookworm, bookworm (security)8.2.24-1~deb12u1fixed
sid, trixie8.2.24-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php7.4sourcebullseye7.4.33-1+deb11u6DLA-3920-1
php7.4source(unstable)(unfixed)
php8.2sourcebookworm8.2.24-1~deb12u1DSA-5780-1
php8.2source(unstable)8.2.24-1

Notes

Fixed in 8.3.12, 8.2.24
https://github.com/php/php-src/security/advisories/GHSA-94p6-54jq-9mwp
https://github.com/php/php-src/commit/48808d98f4fc2a05193cdcc1aedd6c66816450f1 (PHP-8.2.24)

Search for package or bug name: Reporting problems