CVE-2024-46547

7.5 HIGH

📋 TL;DR

This vulnerability allows unauthorized users to access sensitive information through the PHP Info Page in Wampserver due to improper access control. All versions of Wampserver are affected, potentially exposing server configuration details, environment variables, and other sensitive data to attackers.

💻 Affected Systems

Products:
  • Wampserver
Versions: All versions (specifically discovered in v3.2.3 and v3.2.6)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Wampserver is a Windows web development environment that bundles Apache, PHP, and MySQL. The vulnerability affects the default PHP Info page access controls.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could obtain sensitive server configuration details, database credentials, environment variables, and other critical information that could lead to full system compromise.

🟠

Likely Case

Unauthorized users accessing PHP configuration information, potentially revealing server paths, installed modules, and other system details that could aid further attacks.

🟢

If Mitigated

With proper access controls, only authorized administrators can access PHP Info pages, preventing information disclosure.

🌐 Internet-Facing: HIGH - If Wampserver is exposed to the internet, attackers can directly access sensitive information without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still access sensitive information, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires simply accessing the PHP Info page URL without authentication. The GitHub gist provides technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Apply workarounds or restrict access to PHP Info pages.

🔧 Temporary Workarounds

Restrict PHP Info Page Access

all

Configure Apache to restrict access to phpinfo.php or disable the PHP Info page entirely

# In Apache configuration or .htaccess:
<Files "phpinfo.php">
    Require all denied
</Files>
# Alternative: Remove or rename phpinfo.php file
mv /path/to/phpinfo.php /path/to/phpinfo.php.disabled

IP Restriction

all

Restrict access to PHP Info pages to specific IP addresses only

# In Apache configuration or .htaccess:
<Files "phpinfo.php">
    Require ip 192.168.1.0/24
    Require ip 10.0.0.0/8
</Files>

🧯 If You Can't Patch

  • Implement network segmentation to isolate Wampserver instances from untrusted networks
  • Deploy a web application firewall (WAF) to block access to phpinfo.php paths

🔍 How to Verify

Check if Vulnerable:

Access http://[server-address]/phpinfo.php without authentication. If PHP configuration information is displayed, the system is vulnerable.

Check Version:

Check Wampserver version in the system tray icon or via the Wampserver interface

Verify Fix Applied:

Attempt to access phpinfo.php without authentication. You should receive a 403 Forbidden error or similar access denial.

📡 Detection & Monitoring

Log Indicators:

  • HTTP 200 responses to /phpinfo.php from unauthorized IPs
  • Multiple requests to phpinfo.php from single IP

Network Indicators:

  • Unusual traffic to phpinfo.php endpoint
  • External IPs accessing PHP Info pages

SIEM Query:

source="apache_access.log" AND uri="/phpinfo.php" AND response="200" AND NOT src_ip IN (allowed_admin_ips)

🔗 References

📤 Share & Export