CVE-2024-5585

Updated: 2025-08-20 03:02:39.438659

Description:

In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.


Links NIST CIRCL RHEL Ubuntu

Severity

Severity Score
CVSS Version 2.x 0.0
CVSS Version 3.x HIGH 8.8

Status

OS name Project name Version Score Severity Status Errata Last updated

Statement

AlmaLinux 9.2 ESU php 8.0.30 8.8 HIGH Not Vulnerable 2025-01-15 01:09:50
CentOS 6 ELS php 5.3.3 8.8 HIGH Not Vulnerable 2024-06-14 10:10:39
CentOS 7 ELS php 5.4.16 8.8 HIGH Not Vulnerable 2024-06-14 10:10:38
CentOS 8.4 ELS php 7.4.6 8.8 HIGH Not Vulnerable 2024-06-14 10:10:38
CentOS 8.5 ELS php 7.4.19 8.8 HIGH Not Vulnerable 2024-06-14 10:10:38
CentOS Stream 8 ELS php 7.2.24 8.8 HIGH Not Vulnerable 2024-06-14 10:10:35
CloudLinux 6 ELS php 5.3.3 8.8 HIGH Not Vulnerable 2024-06-14 10:10:38
CloudLinux 7 ELS php 5.4.16 8.8 HIGH Not Vulnerable 2024-08-16 12:20:34
Debian 10 ELS php 7.3 8.8 HIGH Not Vulnerable 2025-10-23 14:58:19
Oracle Linux 6 ELS php 5.3.3 8.8 HIGH Not Vulnerable 2024-06-14 10:10:38
Total: 14