PHP CGI
– Date: 6th of June –
📢 Threat Alert – PHP CGI – Security researchers found a critical PHP remote code execution vulnerability in Window servers. Please patch your PHP a.s.a.p. and if that’s not possible read the mitigations down below!
⚠️ An unauthenticated attacker can execute arbitrary code on remote PHP servers through an argument injection attack.
⚠️ Some locales (Traditional & Simplified Chinese, Japanse) are confirmed vulnerable. However others could be vulnerable as well.
⚠️ When configuring the Action directive to map corresponding HTTP requests to a PHP-CGI executable binary in Apache HTTP Server, this vulnerability can be exploited directly.
⚠️ Even if PHP is not configured under the CGI mode, merely exposing the PHP executable binary in the CGI directory is affected by this vulnerability, too.
⚠️ The vulnerable versions are:
Other PHP versions are End-of-Life and are no longer maintained.
❗It gives anyone power over your website infrastructure which could result in attackers taking over your devices.
❗The main challenge of this vulnerability is that you may be using PHP without knowing.
Your website provider may be using PHP.
You have a website that uses PHP (WordPress, for example).
Some applications may be using PHP to provide their services.
❗XAMPP is vulnerable by default
🛡️ Free threat hunting based on the indicators for this attack
🛡️ Personalized assistance to mitigate the risk
🛡️ 24×7 Incident Response (CSIRT)
🛡️ 24×7 monitoring of customer environments
✅ Patch to the latest available version.
✅ If PHP CGI is a not needed feature, you modify the Apache HTTP Server configuration:
C:/xampp/apache/conf/extra/httpd-xampp.conf
Comment out the following line with a # like below:
# ScriptAlias /php-cgi/ “C:/xampp/php/”
✅ If it’s a needed feature, the following Rewrite Rules can be used to temporarily block attacks.
RewriteEngine On
RewriteCond %{QUERY_STRING} ^%ad [NC]
RewriteRule .? – [F,L]
✅ Remove all USB controllers from the Virtual Machine, disabling USB passthrough functionality, and rendering virtual USB devices inaccessible.
✅ Default keyboard and mouse input devices remain unaffected because they operate independently of the USB protocol.
This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.
Strictly Necessary Cookie should be enabled at all times so that we can save your preferences for cookie settings.
If you disable this cookie, we will not be able to save your preferences. This means that every time you visit this website you will need to enable or disable cookies again.
This website uses Google Analytics, Facebook Pixel, LinkedIn Insight tag and the Active Campaign tag to collect anonymous information such as the number of visitors to the site, and the most popular pages.
Keeping this cookie enabled helps us to improve our website.
Please enable Strictly Necessary Cookies first so that we can save your preferences!
More information about our Cookie Policy