Lucene search

K
amazonAmazonALAS-2021-1466
HistoryJan 12, 2021 - 10:51 p.m.

Medium: php7-pear

2021-01-1222:51:00
alas.aws.amazon.com
6

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.965 High

EPSS

Percentile

99.6%

Issue Overview:

Archive_Tar through 1.4.10 allows an unserialization attack because phar: is blocked but PHAR: is not blocked. (CVE-2020-28948)

Archive_Tar through 1.4.10 has :// filename sanitization only to address phar attacks, and thus any other stream-wrapper attack (such as file:// to overwrite files) can still succeed. (CVE-2020-28949)

Affected Packages:

php7-pear

Issue Correction:
Run yum update php7-pear to update your system.

New Packages:

noarch:  
    php7-pear-1.10.12-4.30.amzn1.noarch  
  
src:  
    php7-pear-1.10.12-4.30.amzn1.src  

Additional References

Red Hat: CVE-2020-28948, CVE-2020-28949

Mitre: CVE-2020-28948, CVE-2020-28949

OSVersionArchitecturePackageVersionFilename
Amazon Linux1noarchphp7-pear< 1.10.12-4.30.amzn1php7-pear-1.10.12-4.30.amzn1.noarch.rpm

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

6.8 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:P/I:P/A:P

0.965 High

EPSS

Percentile

99.6%