cve/2024/CVE-2024-11235.md
2025-09-29 21:09:30 +02:00

19 lines
970 B
Markdown
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-11235](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-11235)
![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=8.3.*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=8.4.*%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-416%20Use%20After%20Free&color=brightgreen)
### Description
In PHP versions 8.3.* before 8.3.19 and 8.4.* before 8.4.5, a code sequence involving __set handler or ??=  operator and exceptions can lead to a use-after-free vulnerability. If the third party can control the memory layout leading to this, for example by supplying specially crafted inputs to the script, it could lead to remote code execution.
### POC
#### Reference
- https://github.com/php/php-src/security/advisories/GHSA-rwp7-7vc6-8477
#### Github
- https://github.com/ARPSyndicate/cve-scores