{"id":29581,"date":"2024-06-12T02:50:06","date_gmt":"2024-06-12T02:50:06","guid":{"rendered":"https:\/\/nsfocusglobal.com\/?p=29581"},"modified":"2026-04-17T18:07:37","modified_gmt":"2026-04-17T18:07:37","slug":"php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/","title":{"rendered":"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory"},"content":{"rendered":"<!DOCTYPE html PUBLIC \"-\/\/W3C\/\/DTD HTML 4.0 Transitional\/\/EN\" \"http:\/\/www.w3.org\/TR\/REC-html40\/loose.dtd\">\n<html><body><h2 class=\"wp-block-heading\">Overview<\/h2>\n\n\n\n<p>NSFOCUS CERT has monitored the disclosure of a PHP CGI Windows platform remote code execution vulnerability (CVE-2024-4577) on the internet recently. Due to PHP&#8217;s oversight of the Best-Fit character mapping feature of the Windows system during its design, running PHP in CGI mode on the Windows platform and using the following language settings (Simplified Chinese 936\/Traditional Chinese 950\/Japanese 932, etc.) are affected by this vulnerability. Unauthenticated attackers can construct malicious requests to bypass the protection of the CVE-2012-1823 patch and execute arbitrary code remotely through parameter injection. The PoC of the vulnerability has been made public, and users are advised to take protective measures as soon as possible. <\/p>\n\n\n\n<p>PHP is a widely used open-source scripting language commonly used for web development; PHP CGI is a method of running PHP scripts through the Common Gateway Interface (CGI) to handle HTTP requests and generate dynamic web content.<\/p>\n\n\n\n<p>Reference link: <\/p>\n\n\n\n<p><a href=\"https:\/\/devco.re\/blog\/2024\/06\/06\/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/devco.re\/blog\/2024\/06\/06\/security-alert-cve-2024-4577-php-cgi-argument-injection-vulnerability<\/a><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Affected Scope<\/h2>\n\n\n\n<p><strong>Affected Versions<\/strong><\/p>\n\n\n\n<p>PHP 8.3 &lt; 8.3.8<\/p>\n\n\n\n<p>PHP 8.2 &lt; 8.2.20<\/p>\n\n\n\n<p>PHP 8.1 &lt; 8.1.29 <\/p>\n\n\n\n<p>Note: Official support and maintenance for PHP 8, PHP 7, and PHP 5 have been discontinued.<\/p>\n\n\n\n<p><strong>Unaffected Versions<\/strong><\/p>\n\n\n\n<p>PHP 8.3 &gt;= 8.3.8<\/p>\n\n\n\n<p>PHP 8.2 &gt;= 8.2.20<\/p>\n\n\n\n<p>PHP 8.1 &gt;= 8.1.29<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Vulnerability Detection<\/h2>\n\n\n\n<p><strong>Version Detection<\/strong><\/p>\n\n\n\n<p>Users of PHP CGI on the Windows system can determine whether the application is within the affected scope by checking the PHP version:<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>php -v<\/code><\/pre>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><a href=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/Figure-1.png\"><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/Figure-1.png\" alt=\"Red circular no entry sign with a white horizontal bar.\" class=\"wp-image-29582\" width=\"715\" height=\"85\" srcset=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/Figure-1.png 547w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/Figure-1-300x36.png 300w, https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/Figure-1-200x24.png 200w\" sizes=\"(max-width: 715px) 100vw, 715px\" \/><\/a><\/figure>\n<\/div>\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protection Methods<\/h2>\n\n\n\n<p><strong>Upgrade<\/strong><\/p>\n\n\n\n<p>This vulnerability has already been fixed in the latest version officially, and users affected are advised to upgrade their version as soon as possible for protection. Official download link: <a href=\"https:\/\/www.php.net\/downloads.php\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.php.net\/downloads.php<\/a>  <\/p>\n\n\n\n<p><strong>Other Mitigation Measures<\/strong><\/p>\n\n\n\n<p> If users are temporarily unable to upgrade, the following measures can be taken for temporary protection:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>If the business does not use PHP-CGI, it is recommended to disable the CGI function temporarily.<\/li>\n\n\n\n<li>Users in Traditional Chinese, Simplified Chinese, and Japanese language environments can use the following rewrite rules for attack protection: <\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>RewriteEngine On\nRewriteCond %{QUERY_STRING} ^%ad [NC]\nRewriteRule .? - [F,L]\n<\/code><\/pre>\n\n\n\n<p>(Note: In practice, updating to a secure version or migrating the architecture is still recommended.)<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>For users of XAMPP for Windows, if it is confirmed that PHP CGI functionality is not needed, the vulnerability&#8217;s impact can be avoided by modifying the following Apache HTTP Server configuration: C:\/xampp\/apache\/conf\/extra\/httpd-xampp.conf<\/li>\n<\/ul>\n\n\n\n<p> Find the corresponding line: <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>ScriptAlias \/php-cgi\/ \"C:\/xampp\/php\/\"<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p> And comment it out:  <\/p>\n\n\n\n<pre class=\"wp-block-code\"><code># ScriptAlias \/php-cgi\/ \"C:\/xampp\/php\/\"<\/code><\/pre>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Declaration<\/strong><\/p>\n\n\n\n<p>This security advisory is solely for the purpose of describing potential security issues, and NSFOCUS does not provide any warranties or commitments for this security advisory. NSFOCUS and the author of this security advisory are not responsible for any direct or indirect consequences and losses caused by the dissemination or use of the information provided in this security advisory. NSFOCUS reserves the right to modify and interpret this security advisory. If you wish to reprint or disseminate this security advisory, you must ensure the integrity of this security advisory, including the copyright statement and all content. Without the permission of NSFOCUS, do not arbitrarily modify or reduce the content of this security advisory, and do not use it for commercial purposes in any way.<\/p>\n<\/body><\/html>\n","protected":false},"excerpt":{"rendered":"<p>Overview NSFOCUS CERT has monitored the disclosure of a PHP CGI Windows platform remote code execution vulnerability (CVE-2024-4577) on the internet recently. Due to PHP&#8217;s oversight of the Best-Fit character mapping feature of the Windows system during its design, running PHP in CGI mode on the Windows platform and using the following language settings (Simplified [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":29587,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[3,6],"tags":[315,584],"class_list":["post-29581","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-emergency-response","tag-cve-2024-4577","tag-php-cgi"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview NSFOCUS CERT has monitored the disclosure of a PHP CGI Windows platform remote code execution vulnerability (CVE-2024-4577) on the internet\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-12T02:50:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-17T18:07:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/R-C.png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview NSFOCUS CERT has monitored the disclosure of a PHP CGI Windows platform remote code execution vulnerability (CVE-2024-4577) on the internet\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/R-C.png\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory\",\"datePublished\":\"2024-06-12T02:50:06+00:00\",\"dateModified\":\"2026-04-17T18:07:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/\"},\"wordCount\":505,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/R-C.png\",\"keywords\":[\"CVE-2024-4577;\",\"PHP CGI;\"],\"articleSection\":[\"Blog\",\"Emergency Response\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/\",\"name\":\"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/R-C.png\",\"datePublished\":\"2024-06-12T02:50:06+00:00\",\"dateModified\":\"2026-04-17T18:07:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/R-C.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/06\\\/R-C.png\",\"width\":2048,\"height\":1024,\"caption\":\"PHP logo on a blue circular background.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory - NSFOCUS","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"pt_BR","og_type":"article","og_title":"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory - NSFOCUS","og_description":"Overview NSFOCUS CERT has monitored the disclosure of a PHP CGI Windows platform remote code execution vulnerability (CVE-2024-4577) on the internet","og_url":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/","og_site_name":"NSFOCUS","article_published_time":"2024-06-12T02:50:06+00:00","article_modified_time":"2026-04-17T18:07:37+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/R-C.png","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory - NSFOCUS","twitter_description":"Overview NSFOCUS CERT has monitored the disclosure of a PHP CGI Windows platform remote code execution vulnerability (CVE-2024-4577) on the internet","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/R-C.png","twitter_misc":{"Escrito por":"admin","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/"},"author":{"name":"admin","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory","datePublished":"2024-06-12T02:50:06+00:00","dateModified":"2026-04-17T18:07:37+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/"},"wordCount":505,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/R-C.png","keywords":["CVE-2024-4577;","PHP CGI;"],"articleSection":["Blog","Emergency Response"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/","url":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/","name":"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/R-C.png","datePublished":"2024-06-12T02:50:06+00:00","dateModified":"2026-04-17T18:07:37+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/R-C.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/06\/R-C.png","width":2048,"height":1024,"caption":"PHP logo on a blue circular background."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/php-cgi-windows-platform-remote-code-execution-vulnerability-cve-2024-4577-advisory\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"PHP CGI Windows Platform Remote Code Execution Vulnerability (CVE-2024-4577) Advisory"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#website","url":"https:\/\/nsfocusglobal.com\/pt-br\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/pt-br\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/pt-br\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/pt-br\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"admin","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/29581","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=29581"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/29581\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/29587"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=29581"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=29581"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=29581"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}