vulnerability
Amazon Linux AMI 2: CVE-2024-8927: Security patch for php (Multiple Advisories)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | Oct 8, 2024 | Feb 26, 2025 | Feb 26, 2025 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
Oct 8, 2024
Added
Feb 26, 2025
Modified
Feb 26, 2025
Description
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.
Solutions
amazon-linux-ami-2-upgrade-phpamazon-linux-ami-2-upgrade-php-bcmathamazon-linux-ami-2-upgrade-php-cliamazon-linux-ami-2-upgrade-php-commonamazon-linux-ami-2-upgrade-php-dbaamazon-linux-ami-2-upgrade-php-dbgamazon-linux-ami-2-upgrade-php-debuginfoamazon-linux-ami-2-upgrade-php-develamazon-linux-ami-2-upgrade-php-embeddedamazon-linux-ami-2-upgrade-php-enchantamazon-linux-ami-2-upgrade-php-fpmamazon-linux-ami-2-upgrade-php-gdamazon-linux-ami-2-upgrade-php-gmpamazon-linux-ami-2-upgrade-php-intlamazon-linux-ami-2-upgrade-php-ldapamazon-linux-ami-2-upgrade-php-mbstringamazon-linux-ami-2-upgrade-php-mysqlndamazon-linux-ami-2-upgrade-php-odbcamazon-linux-ami-2-upgrade-php-opcacheamazon-linux-ami-2-upgrade-php-pdoamazon-linux-ami-2-upgrade-php-pgsqlamazon-linux-ami-2-upgrade-php-processamazon-linux-ami-2-upgrade-php-pspellamazon-linux-ami-2-upgrade-php-snmpamazon-linux-ami-2-upgrade-php-soapamazon-linux-ami-2-upgrade-php-sodiumamazon-linux-ami-2-upgrade-php-xml
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.