Description
In PHP versions 8.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue: when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
Remediation
References
Related Vulnerabilities
WordPress 3.9.1 Multiple Vulnerabilities (3.9 - 3.9.1)
WordPress Plugin WordPress Books Gallery Cross-Site Request Forgery (4.4.8)
e107 Other Vulnerability (CVE-2005-2559)
WordPress Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2012-4448)
Opencart Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2018-13067)