J.Wick
Regular Pleskian
- Server operating system version
- Rocky Linux 8.10
- Plesk version and microupdate number
- Version 18.0.61 Update #5
This alert came out three days ago and there's no update for the following PHP vulnerability.
TLP:CLEAR
MS-ISAC CYBERSECURITY ADVISORY
MS-ISAC ADVISORY NUMBER:
2024-067
DATE(S) ISSUED:
06/07/2024
SUBJECT:
Multiple Vulnerabilities in PHP Could Allow for Remote Code Execution
OVERVIEW:
Multiple vulnerabilities have been discovered in PHP which could allow for remote code execution. PHP is a programming language originally designed for use in web-based applications with HTML content. Successful exploitation could allow for remote code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
THREAT INTELLIGENCE:
Open-source reports have stated that proof of concept exploits are available for CVE-2024-4577.
SYSTEMS AFFECTED:
RISK:
Government:
Businesses:
TECHNICAL SUMMARY:
Multiple vulnerabilities have been discovered in PHP which could allow for remote code execution. Details of the vulnerabilities are as follows:
Tactic: Execution (TA0041):
Technique: Command and Scripting Interpreter (T1059):
TLP:CLEAR
MS-ISAC CYBERSECURITY ADVISORY
MS-ISAC ADVISORY NUMBER:
2024-067
DATE(S) ISSUED:
06/07/2024
SUBJECT:
Multiple Vulnerabilities in PHP Could Allow for Remote Code Execution
OVERVIEW:
Multiple vulnerabilities have been discovered in PHP which could allow for remote code execution. PHP is a programming language originally designed for use in web-based applications with HTML content. Successful exploitation could allow for remote code execution in the context of the affected service account. Depending on the privileges associated with the service account an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
THREAT INTELLIGENCE:
Open-source reports have stated that proof of concept exploits are available for CVE-2024-4577.
SYSTEMS AFFECTED:
- PHP versions: 5 - 8.3.7
RISK:
Government:
- Large and medium government entities: High
- Small government entities: Medium
Businesses:
- Large and medium business entities: High
- Small business entities: Medium
TECHNICAL SUMMARY:
Multiple vulnerabilities have been discovered in PHP which could allow for remote code execution. Details of the vulnerabilities are as follows:
Tactic: Execution (TA0041):
Technique: Command and Scripting Interpreter (T1059):
- CVE-2024-1874: OS Command Injection
- CVE-2024-2408: Observable discrepancy
- CVE-2024-4577: OS Command Injection
- CVE-2024-5458: Input validation error