Lucene search

K
cvelistGitHub_MCVELIST:CVE-2024-24754
HistoryFeb 01, 2024 - 4:10 p.m.

CVE-2024-24754 Bref Body Parsing Inconsistency in Event-Driven Functions

2024-02-0116:10:30
CWE-436
GitHub_M
www.cve.org
aws lambda
bref
event-driven
php
vulnerabilities
patched

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

9.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.5%

Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a RequestHandlerInterface, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and its content added in the $files or $parsedBody arrays. The conversion process produces a different output compared to the one of plain PHP when keys ending with and open square bracket ([) are used. Based on the application logic the difference in the body parsing might lead to vulnerabilities and/or undefined behaviors. This vulnerability is patched in 2.1.13.

CNA Affected

[
  {
    "vendor": "brefphp",
    "product": "bref",
    "versions": [
      {
        "version": "< 2.1.13",
        "status": "affected"
      }
    ]
  }
]

3.7 Low

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

9.8 High

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

32.5%

Related for CVELIST:CVE-2024-24754