cve/2024/CVE-2024-24754.md
2024-06-18 02:51:15 +02:00

18 lines
1.2 KiB
Markdown

### [CVE-2024-24754](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-24754)
![](https://img.shields.io/static/v1?label=Product&message=bref&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%20%3C%202.1.13%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-436%3A%20Interpretation%20Conflict&color=brighgreen)
### Description
Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and its content added in the `$files` or `$parsedBody` arrays. The conversion process produces a different output compared to the one of plain PHP when keys ending with and open square bracket ([) are used. Based on the application logic the difference in the body parsing might lead to vulnerabilities and/or undefined behaviors. This vulnerability is patched in 2.1.13.
### POC
#### Reference
- https://github.com/brefphp/bref/security/advisories/GHSA-82vx-mm6r-gg8w
#### Github
No PoCs found on GitHub currently.