Ransomware attackers quickly weaponize PHP vulnerability with 9.8 severity rating

'Ransomware criminals have quickly weaponized an easy-to-exploit vulnerability in the PHP programming language that executes malicious code on web servers, security researchers said. As of Thursday, Internet scans performed by security firm Censys had detected 1,000 servers infected by a ransomware strain known as TellYouThePass, down from 1,800 detected on Monday. The servers, primarily located in China, no longer display their usual content; instead, many list the site’s file directory, which shows all files have been given a .locked extension, indicating they have been encrypted. An accompanying ransom note demands roughly $6,500 in exchange for the decryption key. The vulnerability, tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors in the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied input into characters that pass malicious commands to the main PHP application. Exploits allow attackers to bypass CVE-2012-1823, a critical code execution vulnerability patched in PHP in 2012. CVE-2024-4577 affects PHP only when it runs in a mode known as CGI, in which a web server parses HTTP requests and passes them to a PHP script for processing. Even when PHP isn’t set to CGI mode, however, the vulnerability may still be exploitable when PHP executables such as php.exe and php-cgi.exe are in directories that are accessible by the web server. This configuration is extremely rare, with the exception of the XAMPP platform, which uses it by default. An additional requirement appears to be that the Windows locale—used to personalize the OS to the local language of the user—must be set to either Chinese or Japanese.' -- source: https://arstechnica.com/security/2024/06/thousands-of-servers-infected-with-... Cheers, Peter

On Mon, 17 Jun 2024 10:45:57 +1200, Peter Reutemann quoted:
'The vulnerability, tracked as CVE-2024-4577 and carrying a severity rating of 9.8 out of 10, stems from errors in the way PHP converts Unicode characters into ASCII. A feature built into Windows known as Best Fit allows attackers to use a technique known as argument injection to convert user-supplied input into characters that pass malicious commands to the main PHP application.'
Just a note that this is strictly a Windows misfeature. PHP is doing checks for potentially dangerous characters in the passed parameters. But attackers can pass certain supposedly non-dangerous characters, and Windows will helpfully convert them to their dangerous equivalents--after PHP has done its checks! Step-by-step exploit walkthrough here <https://arstechnica.com/security/2024/06/php-vulnerability-allows-attackers-to-run-malicious-code-on-windows-servers/>. How many ways can the Windows command-line be broken? Let me count the ways <https://www.theregister.com/2024/04/10/rust_critical_vulnerability_windows/>.
participants (2)
-
Lawrence D'Oliveiro
-
Peter Reutemann