Lucene search

K
cvelistPhpCVELIST:CVE-2022-31626
HistoryJun 16, 2022 - 5:45 a.m.

CVE-2022-31626 mysqlnd/pdo password buffer overflow

2022-06-1605:45:16
CWE-120
php
www.cve.org
7
cve-2022-31626
mysqlnd/pdo
buffer overflow
php
remote code execution

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.008

Percentile

81.6%

In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when pdo_mysql extension with mysqlnd driver, if the third party is allowed to supply host to connect to and the password for the connection, password of excessive length can trigger a buffer overflow in PHP, which can lead to a remote code execution vulnerability.

CNA Affected

[
  {
    "vendor": "PHP Group",
    "product": "PHP",
    "versions": [
      {
        "version": "7.4.X",
        "status": "affected",
        "lessThan": "7.4.30",
        "versionType": "custom"
      },
      {
        "version": "8.0.X",
        "status": "affected",
        "lessThan": "8.0.20",
        "versionType": "custom"
      },
      {
        "version": "8.1.X",
        "status": "affected",
        "lessThan": "8.1.7",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H

AI Score

9.6

Confidence

High

EPSS

0.008

Percentile

81.6%