According to its banner, the version of PHP running on the remote web server is 7.1.x prior to 7.1.32, 7.2.x prior to 7.2.22 or 7.3.x prior to 7.3.9. It is, therefore, affected by multiple vulnerabilities including an unspecified heap buffer overflow.
Note that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.
{"id": "WEB_APPLICATION_SCANNING_98683", "vendorId": null, "type": "nessus", "bulletinFamily": "scanner", "title": "PHP 7.2.x < 7.2.22 Multiple Vulnerabilities", "description": "According to its banner, the version of PHP running on the remote web server is 7.1.x prior to 7.1.32, 7.2.x prior to 7.2.22 or 7.3.x prior to 7.3.9. It is, therefore, affected by multiple vulnerabilities including an unspecified heap buffer overflow.\n\nNote that the scanner has not tested for these issues but has instead relied only on the application's self-reported version number.", "published": "2019-09-18T00:00:00", "modified": "2023-03-14T00:00:00", "epss": [], "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {}, "href": "https://www.tenable.com/plugins/was/98683", "reporter": "This script is Copyright (C) 2019-2023 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224", "https://www.php.net/index.php#2019-08-29-2", "https://php.net/ChangeLog-7.php#7.2.22"], "cvelist": [], "immutableFields": [], "lastseen": "2023-09-30T15:46:03", "viewCount": 11, "enchantments": {"dependencies": {"references": []}, "score": {"value": 2.2, "vector": "NONE"}, "backreferences": {"references": [{"type": "almalinux", "idList": ["ALSA-2020:3662"]}, {"type": "amazon", "idList": ["ALAS-2019-1283", "ALAS-2019-1295"]}, {"type": "cve", "idList": ["CVE-2019-13224"]}, {"type": "debian", "idList": ["DEBIAN:DLA-1854-1:F6B60"]}, {"type": "debiancve", "idList": ["DEBIANCVE:CVE-2019-13224"]}, {"type": "f5", "idList": ["F5:K00103182"]}, {"type": "fedora", "idList": ["FEDORA:2F0F460F096A", "FEDORA:609CD6153F40", "FEDORA:735A760C4528", "FEDORA:E0B4F6075B3D", "FEDORA:E804C60D0D7B"]}, {"type": "freebsd", "idList": ["A8D87C7A-D1B1-11E9-A616-0992A4564E7C"]}, {"type": "gentoo", "idList": ["GLSA-201911-03"]}, {"type": "nessus", "idList": ["AL2_ALAS-2019-1288.NASL", "ALA_ALAS-2019-1283.NASL", "ALA_ALAS-2019-1295.NASL", "DEBIAN_DLA-1854.NASL", "EULEROS_SA-2019-2086.NASL", "FEDORA_2019-3F3D0953DB.NASL", "FEDORA_2019-5409BB5E68.NASL", "FREEBSD_PKG_A8D87C7AD1B111E9A6160992A4564E7C.NASL", "GENTOO_GLSA-201911-03.NASL", "PHOTONOS_PHSA-2019-3_0-0024_ONIGURUMA.NASL", "REDHAT-RHSA-2020-3662.NASL"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310108633", "OPENVAS:1361412562310108634", "OPENVAS:1361412562310876622", "OPENVAS:1361412562310876625", "OPENVAS:1361412562310891854"]}, {"type": "oraclelinux", "idList": ["ELSA-2020-3662"]}, {"type": "photon", "idList": ["PHSA-2019-3.0-0024"]}, {"type": "redhat", "idList": ["RHSA-2020:3662"]}, {"type": "thn", "idList": ["THN:5483F752911D643A7A952FBFA7B4B7E4"]}, {"type": "ubuntu", "idList": ["USN-4088-1"]}, {"type": "ubuntucve", "idList": ["UB:CVE-2019-13224"]}]}, "exploitation": null, "epss": [{"cve": "CVE-2019-13224", "epss": 0.00422, "percentile": 0.70436, "modified": "2023-05-07"}], "vulnersScore": 2.2}, "_state": {"dependencies": 1696088783, "score": 1698842854, "epss": 0}, "_internal": {"score_hash": "58cf5676c46190b3bb26aecb2e82c39a"}, "pluginID": "98683", "sourceData": "No source data", "naslFamily": "Component Vulnerability", "cpe": ["cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"], "solution": "Upgrade to PHP version 7.2.22 or later.", "nessusSeverity": "High", "cvssScoreSource": "CVE-2019-13224", "vendor_cvss2": {"score": 7.5, "vector": "CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P"}, "vendor_cvss3": {"score": 9.8, "vector": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}, "vpr": {"risk factor": "Medium", "score": "5.9"}, "exploitAvailable": false, "exploitEase": "No known exploits are available", "patchPublicationDate": "2019-07-10T00:00:00", "vulnerabilityPublicationDate": "2019-07-10T00:00:00", "exploitableWith": []}