
Summary
The CVE-2024-4577 is a vulnerability found in specific PHP versions (8.1.* < 8.1.29, 8.2.* < 8.2.20, 8.3.* < 8.3.8) when configured with Apache and PHP-CGI on Windows. It stems from Windows' 'Best-Fit' character replacement behavior associated with certain code pages, which can lead the PHP CGI module to misinterpret command line characters as PHP options. This misinterpretation allows potential attackers to execute arbitrary PHP code on the server, disclosing source code through invoked PHP instructions. The associated detection rule employs Splunk logic to sniff for malicious POST requests that include soft hyphens along with specific PHP options or opening tags. It utilizes a web application firewall (WAF) logs category to capture these instances and summarizes data using stats, lookup, and renaming functions.
Categories
- Web
- Cloud
- Application
Data Sources
- Web Credential
- Application Log
ATT&CK Techniques
- T1059
- T1190
Created: 2024-06-13