Lucene search

K
cve[email protected]CVE-2024-2408
HistoryJun 09, 2024 - 8:15 p.m.

CVE-2024-2408

2024-06-0920:15:09
CWE-203
web.nvd.nist.gov
27
php
openssl_private_decrypt
vulnerability
marvin attack
openssl
pkcs1 padding
windows builds

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.2%

The openssl_private_decrypt function in PHP, when using PKCS1 padding (OPENSSL_PKCS1_PADDING, which is the default), is vulnerable to the Marvin Attack unless it is used with an OpenSSL version that includes the changes from this pull request: https://github.com/openssl/openssl/pull/13817 (rsa_pkcs1_implicit_rejection). These changes are part of OpenSSL 3.2 and have also been backported to stable versions of various Linux distributions, as well as to the PHP builds provided for Windows since the previous release. All distributors and builders should ensure that this version is used to prevent PHP from being vulnerable.

PHP Windows builds for the versionsΒ 8.1.29,Β 8.2.20 andΒ 8.3.8 and above include OpenSSL patches that fix the vulnerability.

Affected configurations

NVD
Node
phpphpRange8.1.0–8.1.29
OR
phpphpRange8.2.0–8.2.20
OR
phpphpRange8.3.0–8.3.8
Node
fedoraprojectfedoraMatch40

CNA Affected

[
  {
    "defaultStatus": "affected",
    "modules": [
      "openssl"
    ],
    "product": "PHP",
    "programRoutines": [
      {
        "name": "openssl_private_decrypt"
      }
    ],
    "repo": "https://github.com/php/php-src",
    "vendor": "PHP Group",
    "versions": [
      {
        "lessThan": "8.1.29",
        "status": "affected",
        "version": "8.1.*",
        "versionType": "semver"
      },
      {
        "lessThan": "8.2.20",
        "status": "affected",
        "version": "8.2.*",
        "versionType": "semver"
      },
      {
        "lessThan": "8.3.8",
        "status": "affected",
        "version": "8.3.*",
        "versionType": "semver"
      }
    ]
  }
]

5.9 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N

6.6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

28.2%