cve/2024/CVE-2024-9026.md
2025-09-29 16:08:36 +00:00

19 lines
1.2 KiB
Markdown
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

### [CVE-2024-9026](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9026)
![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=8.1.*%3C%208.1.30%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-117%3A%20Improper%20Output%20Neutralization%20for%20Logs&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-158%3A%20Improper%20Neutralization%20of%20Null%20Byte%20or%20NUL%20Character&color=brighgreen)
### Description
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.
### POC
#### Reference
- https://github.com/php/php-src/security/advisories/GHSA-865w-9rf3-2wh5
#### Github
No PoCs found on GitHub currently.