cvelist/2019/11xxx/CVE-2019-11043.json
2021-07-22 18:00:50 +00:00

249 lines
9.5 KiB
JSON

{
"CVE_data_meta": {
"ASSIGNER": "security@php.net",
"DATE_PUBLIC": "2019-10-22T03:18:00.000Z",
"ID": "CVE-2019-11043",
"STATE": "PUBLIC",
"TITLE": "Underflow in PHP-FPM can lead to RCE"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "PHP",
"version": {
"version_data": [
{
"version_affected": "<",
"version_name": "7.1.x",
"version_value": "7.1.33"
},
{
"version_affected": "<",
"version_name": "7.2.x",
"version_value": "7.2.24"
},
{
"version_affected": "<",
"version_name": "7.3.x",
"version_value": "7.3.11"
}
]
}
}
]
},
"vendor_name": "PHP"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Reported by Emil Lerner. "
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "Exploit described at https://github.com/neex/phuip-fpizdam"
}
],
"generator": {
"engine": "Vulnogram 0.0.8"
},
"impact": {
"cvss": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 8.7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-120 Buffer Overflow"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "MISC",
"url": "https://github.com/neex/phuip-fpizdam",
"name": "https://github.com/neex/phuip-fpizdam"
},
{
"refsource": "CONFIRM",
"name": "https://bugs.php.net/bug.php?id=78599",
"url": "https://bugs.php.net/bug.php?id=78599"
},
{
"refsource": "UBUNTU",
"name": "USN-4166-1",
"url": "https://usn.ubuntu.com/4166-1/"
},
{
"refsource": "DEBIAN",
"name": "DSA-4552",
"url": "https://www.debian.org/security/2019/dsa-4552"
},
{
"refsource": "DEBIAN",
"name": "DSA-4553",
"url": "https://www.debian.org/security/2019/dsa-4553"
},
{
"refsource": "UBUNTU",
"name": "USN-4166-2",
"url": "https://usn.ubuntu.com/4166-2/"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp;utm_medium=RSS",
"url": "https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp;utm_medium=RSS"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-4adc49a476",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/"
},
{
"refsource": "CONFIRM",
"name": "https://security.netapp.com/advisory/ntap-20191031-0003/",
"url": "https://security.netapp.com/advisory/ntap-20191031-0003/"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3286",
"url": "https://access.redhat.com/errata/RHSA-2019:3286"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3287",
"url": "https://access.redhat.com/errata/RHSA-2019:3287"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3299",
"url": "https://access.redhat.com/errata/RHSA-2019:3299"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3300",
"url": "https://access.redhat.com/errata/RHSA-2019:3300"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-187ae3128d",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/"
},
{
"refsource": "FEDORA",
"name": "FEDORA-2019-7bb07c3b02",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2441",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3724",
"url": "https://access.redhat.com/errata/RHSA-2019:3724"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3735",
"url": "https://access.redhat.com/errata/RHSA-2019:3735"
},
{
"refsource": "REDHAT",
"name": "RHSA-2019:3736",
"url": "https://access.redhat.com/errata/RHSA-2019:3736"
},
{
"refsource": "CONFIRM",
"name": "https://www.synology.com/security/advisory/Synology_SA_19_36",
"url": "https://www.synology.com/security/advisory/Synology_SA_19_36"
},
{
"refsource": "SUSE",
"name": "openSUSE-SU-2019:2457",
"url": "http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.apple.com/kb/HT210919",
"url": "https://support.apple.com/kb/HT210919"
},
{
"refsource": "BUGTRAQ",
"name": "20200129 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra",
"url": "https://seclists.org/bugtraq/2020/Jan/44"
},
{
"refsource": "FULLDISC",
"name": "20200131 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra",
"url": "http://seclists.org/fulldisclosure/2020/Jan/40"
},
{
"refsource": "REDHAT",
"name": "RHSA-2020:0322",
"url": "https://access.redhat.com/errata/RHSA-2020:0322"
},
{
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html",
"url": "http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html"
},
{
"refsource": "CONFIRM",
"name": "https://www.tenable.com/security/tns-2021-14",
"url": "https://www.tenable.com/security/tns-2021-14"
}
]
},
"source": {
"defect": [
"https://bugs.php.net/bug.php?id=78599"
],
"discovery": "EXTERNAL"
},
"work_around": [
{
"lang": "eng",
"value": "Configuring nginx (or other server that implements the front-end part of the FPM protocol) to check for the existence of the target file before passing it to PHP FPM (e.g. \"try_files $uri =404\" or \"if (-f $uri)\" in nginx) for would prevent this vulnerability from happening. "
}
]
}