{"id":"AZL-40052","summary":"CVE-2024-1874 affecting package php for versions less than 8.3.8-1","details":"In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.","modified":"2026-04-01T05:13:32.102819Z","published":"2024-04-29T04:15:07Z","upstream":["CVE-2024-1874"],"references":[{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2024-1874"}],"affected":[{"package":{"name":"php","ecosystem":"Azure Linux:3","purl":"pkg:rpm/azure-linux/php"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"8.3.8-1"}]}],"database_specific":{"source":"https://github.com/microsoft/AzureLinuxVulnerabilityData/blob/main/osv/AZL-40052.json"}}],"schema_version":"1.7.5"}