{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-8927","assignerOrgId":"dd77f84a-d19a-4638-8c3d-a322d820ed2b","state":"PUBLISHED","assignerShortName":"php","dateReserved":"2024-09-17T04:09:57.362Z","datePublished":"2024-10-08T03:56:31.849Z","dateUpdated":"2025-11-03T22:33:09.411Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"PHP","vendor":"PHP Group","versions":[{"lessThan":"8.1.30","status":"affected","version":"8.1.*","versionType":"semver"},{"lessThan":"8.2.24","status":"affected","version":"8.2.*","versionType":"semver"},{"lessThan":"8.3.12","status":"affected","version":"8.3.*","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Owen Gong"},{"lang":"en","type":"finder","value":"RyotaK"}],"datePublic":"2024-09-27T17:50:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12,&nbsp;HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to&nbsp;cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.&nbsp;"}],"value":"In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP."}],"impacts":[{"capecId":"CAPEC-252","descriptions":[{"lang":"en","value":"CAPEC-252 PHP Local File Inclusion"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"orgId":"dd77f84a-d19a-4638-8c3d-a322d820ed2b","shortName":"php","dateUpdated":"2024-10-08T03:56:31.849Z"},"references":[{"url":"https://github.com/php/php-src/security/advisories/GHSA-94p6-54jq-9mwp"}],"source":{"discovery":"EXTERNAL"},"title":"cgi.force_redirect configuration is bypassable due to the environment variable collision","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-1220","lang":"en","description":"CWE-1220 Insufficient Granularity of Access Control"}]}],"affected":[{"vendor":"php","product":"php","cpes":["cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"],"defaultStatus":"unknown","versions":[{"version":"8.1.0","status":"affected","lessThan":"8.1.30","versionType":"semver"},{"version":"8.2.0","status":"affected","lessThan":"8.2.24","versionType":"semver"},{"version":"8.3.0","status":"affected","lessThan":"8.3.12","versionType":"semver"}]}],"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-10-08T12:50:40.800289Z","id":"CVE-2024-8927","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-03-18T16:16:00.693Z"}},{"title":"CVE Program Container","references":[{"url":"https://security.netapp.com/advisory/ntap-20241101-0003/"},{"url":"https://lists.debian.org/debian-lts-announce/2024/10/msg00011.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T22:33:09.411Z"}}]}}