Welcome to this week’s Focus Friday, where we delve into critical vulnerabilities reshaping Third-Party Risk Management (TPRM) practices. Today, we spotlight three high-profile issues: PHP-CGI, Microsoft Message Queuing (MSMQ), and Rejetto HTTP File Server (HFS) incidents. Our discussion will cover the specifics of these incidents and illustrate how Black Kite’s FocusTags™ can drive proactive risk management strategies.

Filtered view of companies with a Microsoft MSMQ FocusTag on the Black Kite platform.
CVE-2024-30080 is a critical remote code execution vulnerability that impacts Microsoft Message Queuing (MSMQ). The vulnerability has a CVSSv3 score of 9.8 out of 10.0. It occurs due to the MSMQ service improperly handling operations, which can allow an attacker to execute any code on the victim’s machine, potentially gaining full control over it.
According to Microsoft’s advisory, the vulnerability is exploitable if the MSMQ service is running and port 1801 is open. This impacts all versions of Windows, including Windows Server 2008 and Windows 10.
As of yet, no proof-of-concept (PoC) exploit code has been issued, and the vulnerability is not listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog. Given the low complexity of the attack, threat actors could be extremely inclined towards exploiting these bugs since it can be done without any special privileges or user interaction, thereby increasing exposure.
Based on Microsoft’s Security Update Guide, below are the Windows versions affected by this vulnerability.

Current critical vulnerability affecting Windows products.
Recent research indicates that over 200,000 endpoints may be affected.

Most Windows servers are in Hong Kong, China, and the United States.
June 11, 2024 (Tuesday)
June 12, 2024 (Wednesday)
CVE-2024-30080 poses a serious threat to any organization using Windows, including Windows Server 2008 and Windows 10. This vulnerability’s low complexity makes it easy to exploit, increasing the risk of data breaches and system compromises across the supply chain. With over 200,000 potentially affected endpoints, this vulnerability requires immediate attention. TPRM professionals must ensure that vendors using MSMQ have implemented necessary patches and security measures to prevent exploitation.
A single compromised vendor can jeopardize the entire supply chain. TPRM professionals need to verify that their vendors are actively mitigating this vulnerability to maintain overall security and compliance.
Here are key questions to ask your vendors:
Open communication with your vendors will provide a clear understanding of their approach to this critical vulnerability. This information empowers you to make informed decisions about the security of your systems.
On June 12, 2024, Black Kite applied a FocusTag for CVE-2024-30080. Black Kite customers can filter by this FocusTag to identify their vendors susceptible to this vulnerability and communicate with them with risk intelligence provided by Black Kite.

TPRM specialists can leverage insights from the CVE-2024-30080 FocusTagTM to assess
and prioritize risks diligently, fortifying their defenses effectively.
CVE-2024-23692 is a template injection vulnerability of Rejetto HFS, allowing it to perform RCE and fully compromise the server. Such behavior is possible because special characters are not properly neutralized by the template engine. Due to this behavior, arbitrary command execution is possible by crafted HTTP requests. A PoC exploit has been published, thus far unscheduled for inclusion into CISA’s KEV, that demonstrates exploitation is easy and significant.
This payload used in PoC will exploit the template engine vulnerability and execute arbitrary system commands by injecting special characters along with template commands. Eventually, the attacker will execute the ‘whoami’ command on the server. The response will result from this command, along with custom strings and newlines formatted for readability.
We can outline the steps of the exploit used by the attackers to leverage this critical vulnerability as follows:
Template Injection Method in the vulnerability:
In a PoC study by the Black Kite Research & Intelligence Team (BRITE), unauthorized remote access to critical directories is demonstrated as shared below:

Request and response output of the HFS server tested in the Black Kite Research Team’s PoC process.
PoC for CVE-2024-23692 vulnerability
With a CVSS score of 9.8, the vulnerability poses a significant risk. It is particularly concerning as no patch is available for versions 2.x, which are no longer supported. Users are strongly advised to upgrade to version 3.x to mitigate the risk. Defensive measures such as disabling the server, restricting access, and monitoring for exploitation attempts are recommended.
May 31, 2024 (Friday)
June 11, 2024 (Wednesday)
June 13, 2024 (Thursday)
From a third-party risk management (TPRM) perspective, CVE-2024-23692 highlights the critical need for continuous monitoring and timely upgrading of software used within an organization’s supply chain. The unscheduled inclusion of this vulnerability into CISA’s KEV underscores the urgency for vendors to prioritize and address such high-impact vulnerabilities.
Here are three specific questions to ask vendors regarding the CVE-2024-23692 vulnerability in Rejetto HTTP File Server:
On June 11, 2024, the Black Kite platform applied the FocusTag for Rejetto HFS. This highlights the potential risks associated with unpatched HFS and underscores the importance of proactive security measures to safeguard critical network infrastructure components.

Black Kite’s Rejetto HFS FocusTagTM details critical insights on the
event for TPRM professionals.
CVE-2024-4577 is a critical remote code execution (RCE) vulnerability in PHP, primarily affecting installations on Windows systems running PHP in CGI mode. The flaw arises from improper conversion between Unicode and ASCII characters, specifically how Apache handles soft hyphens (0xAD) versus normal hyphens (0x2D). This allows attackers to inject malicious command-line arguments into running PHP processes, leading to arbitrary code execution.
CISA added the vulnerability to the KEV catalog on June 12, 2024. The POC exploit code was published on June 7, 2024. Considering the low attack complexity, factors likely make threat actors exploit these vulnerabilities as they do not require special privileges or user interaction, increasing the risk. The TellYouThePass Ransomware group is known to exploit this vulnerability.
PHP in CGI mode parses command line arguments from HTTP requests, and the Unicode to ASIC conversion enables attackers to evade conventional escaping mechanisms and, therefore, inject malicious arguments. CVE-2024-4577 has been utilized by various attackers for arbitrary code execution in PHP on targeted systems by leveraging the PHP system function to execute a hosted HTML application file located on an attacker-controlled web server via the mshta.exe binary. This FUD uses a Windows native binary to execute remote payloads, which makes it more ‘live off the land.’ Scanning for this vulnerability has been seen on Greynoise. In attacks, we’ve seen a Gh0st RAT variant and Cobalt Strike beacons get dropped.
Exploiting this vulnerability, one would create an evil HTTP request: Instead of using soft hyphens, they can evade escaping and inject command-line arguments. Example:

Web request to a server within the payload.
In this, %AD is the soft hyphen, and allow_url_include=1 and auto_prepend_file=php://input are PHP directives that enable file inclusion from the HTTP request body for execution. An affected PHP installation while processing this request will run PHP code coming in the request body. Hence, this is a successful RCE. Conditions to be met for exploitation:
It would be beneficial to review a resource that allows you to track step-by-step whether you are affected by the vulnerability.
This vulnerability affects PHP versions from 5.0.0 to 8.1.28, 8.2.0 to 8.2.19, and 8.3.0 to 8.3.7.
June 6, 2024 (Thursday)
June 12, 2024 (Wednesday)
June 13, 2024 (Thursday)
VE-2024-4577 has broad implications for organizations using PHP, especially in environments like XAMPP. Its ease of exploitation and potential for significant damage make it essential for TPRM professionals to ensure their vendors have mitigated this risk.
With proof-of-concept exploits available and active scanning detected, TPRM professionals must verify that their vendors have applied the latest PHP updates and implemented recommended mitigations. Especially exploitation by ransomware groups makes this vulnerability more critical for TRPM professionals.
Ensure vendors are actively monitoring for exploitation attempts and have robust defenses in place, such as web application firewalls and input validation mechanisms.
On June 13, 2024, Black Kite applied a FocusTag for CVE-2024-4577, highlighting the critical remote code execution vulnerability in PHP. Black Kite customers can leverage the platform’s comprehensive risk management capabilities to mitigate the third-party risk associated with this vulnerability. This includes monitoring vendor compliance with security patches, assessing potential exposure in their supply chains, and ensuring that all necessary updates are applied promptly. By using Black Kite’s tools, customers can proactively manage the threat posed by this vulnerability and enhance their overall cybersecurity posture.

Black Kite’s PHP-CGI FocusTagTM details critical insights on the event
for TPRM professionals.
Effective Third-Party Risk Management (TPRM) is crucial in today’s dynamic cybersecurity landscape. Black Kite’s FocusTags™ for PHP-CGI, Microsoft Message Queuing (MSMQ), and Rejetto HTTP File Server (HFS) specifically address the unique challenges posed by these incidents. Here’s how these tags are critical in managing third-party risks:
With these FocusTags™, Black Kite translates intricate threat data into actionable intelligence, empowering TPRM professionals to manage and mitigate risks associated with specific high-profile incidents proactively.
Every week, we delve into the realms of critical vulnerabilities and their implications from a Third-Party Risk Management (TPRM) perspective. This series is dedicated to shedding light on pressing cybersecurity threats, offering in-depth analyses, and providing actionable insights.
https://www.php.net/ChangeLog-8.php
https://labs.watchtowr.com/no-way-php-strikes-again-cve-2024-4577
https://github.com/rapid7/metasploit-framework/pull/19247
https://nvd.nist.gov/vuln/detail/CVE-2024-4577#range-13058888
https://msrc.microsoft.com/update-guide/vulnerability/CVE-2024-30080
https://nvd.nist.gov/vuln/detail/CVE-2024-30080
https://github.com/rapid7/metasploit-framework/pull/19240
https://nvd.nist.gov/vuln/detail/CVE-2024-23692
https://mohemiv.com/all/rejetto-http-file-server-2-3m-unauthenticated-rce
https://nvd.nist.gov/vuln/detail/CVE-2024-24919
https://support.checkpoint.com/results/sk/sk182336
https://labs.watchtowr.com/check-point-wrong-check-point-cve-2024-24919/#
https://nvd.nist.gov/vuln/detail/CVE-2023-28450
https://cybersecuritynews.com/new-dos-attack-dnsbomb-exploiting
https://thehackernews.com/2024/05/researchers-warn-of-catddos-botnet-and.html