
A newly discovered critical security flaw in PHP, identified as CVE-2024-4577, poses a significant threat to systems, potentially allowing remote code execution under certain conditions. This vulnerability specifically impacts all versions of PHP installed on the Windows operating system, raising concerns across the cybersecurity community.
The Nature of the Vulnerability
The vulnerability is a CGI argument injection flaw, which allows attackers to bypass existing protections designed to mitigate another security flaw, CVE-2012-1823. This revelation comes from DEVCORE security researcher Orange Tsai, who detailed the flaw’s mechanism and implications.
“While implementing PHP, the team did not notice the Best-Fit feature of encoding conversion within the Windows operating system,” Tsai explained. “This oversight allows unauthenticated attackers to bypass the previous protection of CVE-2012-1823 by specific character sequences. Arbitrary code can be executed on remote PHP servers through the argument injection attack.”
Disclosure and Patching
Impact on XAMPP and Recommendations
DEVCORE has issued a warning that all XAMPP installations on Windows are vulnerable by default when configured to use locales for Traditional Chinese, Simplified Chinese, or Japanese. This broadens the scope of potential targets, highlighting the urgency for administrators to update their systems.
The Taiwanese cybersecurity firm advises administrators to move away from the outdated PHP CGI altogether and consider more secure alternatives such as Mod-PHP, FastCGI, or PHP-FPM. These solutions offer enhanced security features and better protection against such vulnerabilities.
“This vulnerability is incredibly simple, but that’s also what makes it interesting,” Tsai said. “Who would have thought that a patch, which has been reviewed and proven secure for the past 12 years, could be bypassed due to a minor Windows feature?”

Exploitation in the Wild
The Shadowserver Foundation has already observed exploitation attempts involving CVE-2024-4577 against its honeypot servers within 24 hours of the flaw’s public disclosure. This rapid exploitation underscores the critical nature of the vulnerability and the necessity for immediate action.
In a statement, Shadowserver emphasized the need for vigilance and prompt patching to mitigate potential attacks. The cybersecurity community is on high alert, anticipating a rise in exploitation attempts.
Expert Insights and Urgent Action
Security researcher Aliz Hammond from watchTowr Labs highlighted the simplicity yet dangerous nature of the exploit. Hammond‘s team successfully devised an exploit for CVE-2024-4577, achieving remote code execution and demonstrating the vulnerability’s potential impact.
“A nasty bug with a very simple exploit,” Hammond remarked. “Those running in an affected configuration under one of the affected locales – Chinese (Simplified, Traditional) or Japanese – are urged to do this as fast as humanly possible, as the bug has a high chance of being exploited en-mass due to the low exploit complexity.”
Conclusion
The discovery of CVE-2024-4577 serves as a stark reminder of the ever-evolving landscape of cybersecurity threats. The flaw’s ability to bypass a long-standing security patch underscores the importance of continuous vigilance and proactive security measures. Administrators and users are urged to apply the latest patches immediately and consider more secure configurations to safeguard their systems against potential attacks.
As the cybersecurity community responds to this new threat, the collaboration and swift action of researchers, developers, and administrators will be crucial in mitigating the impact of CVE-2024-4577 and protecting critical infrastructure from malicious exploitation.
Follow us on (Twitter) for real time updates and exclusive content.
Interesting Article : Ukraine’s CERT Warns Against SPECTR Malware Threat via SickSink Espionage Campaign
Pingback: "Passwords": Apple to Launch New Password Manager App in WWDC-2024