### [CVE-2024-11233](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11233) ![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=8.1.*%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.1.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.2.*%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.3.*%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.3.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%20Heap-based%20Buffer%20Overflow&color=brightgreen) ### Description In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error inĀ convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas. ### POC #### Reference - https://github.com/php/php-src/security/advisories/GHSA-r977-prxv-hc43 #### Github No PoCs found on GitHub currently.