Lucene search

K
archlinuxArchLinuxASA-201910-14
HistoryOct 25, 2019 - 12:00 a.m.

[ASA-201910-14] php: arbitrary code execution

2019-10-2500:00:00
security.archlinux.org
27

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

100.0%

Arch Linux Security Advisory ASA-201910-14

Severity: Critical
Date : 2019-10-25
CVE-ID : CVE-2019-11043
Package : php
Type : arbitrary code execution
Remote : Yes
Link : https://security.archlinux.org/AVG-1052

Summary

The package php before version 7.3.11-1 is vulnerable to arbitrary code
execution.

Resolution

Upgrade to 7.3.11-1.

pacman -Syu “php>=7.3.11-1”

The problem has been fixed upstream in version 7.3.11.

Workaround

If nginx and php-fpm share the same filesystem, one can first check the
script actually exists, so the malicious request will never make it to
php-fpm (it is usually done using something like try_files $uri =404). Or there may be cgi.fix_pathinfo=0 which will also prevent
exploitation.

Description

A buffer underflow issue has been found in the php-fpm component of php
before 7.3.11, 7.2.24 and 7.1.33, leading to remote code execution in
certain nginx + php-fpm configurations. This vulnerability can be
exploited if the fastcgi_split_path_info directive contains a regexp
that can be broken by an attacker by supplying %0a in the path info
which results in the fastcgi_param PATH_INFO being empty.

Impact

A remote attacker is able to execute arbitrary code on the affected
host by supplying %0a in the path info if php-fpm is used with a
vulnerable nginx configuration.

References

https://bugs.php.net/bug.php?id=78599
https://git.php.net/?p=php-src.git;a=commitdiff;h=19e17d3807e6cc0b1ba9443ec5facbd33a61f8fe
https://github.com/neex/phuip-fpizdam
https://security.archlinux.org/CVE-2019-11043

OSVersionArchitecturePackageVersionFilename
ArchLinuxanyanyphp< 7.3.11-1UNKNOWN

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.975 High

EPSS

Percentile

100.0%