2024-06-09 20:03:11 +00:00
{
"id" : "CVE-2024-5458" ,
"sourceIdentifier" : "security@php.net" ,
"published" : "2024-06-09T19:15:52.397" ,
2024-07-28 16:03:13 +00:00
"lastModified" : "2024-07-28T14:15:10.873" ,
2024-06-13 06:03:10 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-06-09 20:03:11 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs\u00a0(FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly."
2024-06-10 18:03:10 +00:00
} ,
{
"lang" : "es" ,
"value" : "En las versiones de PHP 8.1.* anteriores a 8.1.29, 8.2.* anteriores a 8.2.20, 8.3.* anteriores a 8.3.8, debido a un error de l\u00f3gica de c\u00f3digo, funciones de filtrado como filter_var al validar URL (FILTER_VALIDATE_URL) para ciertos tipos de URL la funci\u00f3n dar\u00e1 como resultado que la informaci\u00f3n de usuario no v\u00e1lida (nombre de usuario + contrase\u00f1a parte de las URL) se trate como informaci\u00f3n de usuario v\u00e1lida. Esto puede hacer que el c\u00f3digo posterior acepte URL no v\u00e1lidas como v\u00e1lidas y las analice incorrectamente."
2024-06-09 20:03:11 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
2024-06-12 14:03:35 +00:00
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
} ,
2024-06-09 20:03:11 +00:00
{
"source" : "security@php.net" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "NONE" ,
"baseScore" : 5.3 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 1.4
}
]
} ,
2024-06-12 14:03:35 +00:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-345"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "7.3.27" ,
"versionEndIncluding" : "7.3.33" ,
"matchCriteriaId" : "8703A80A-44D8-4615-A849-61526B187D73"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "7.4.15" ,
"versionEndIncluding" : "7.4.33" ,
"matchCriteriaId" : "C937E1A7-44CC-4CA3-815C-0E8709EB393E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.0.2" ,
"versionEndIncluding" : "8.0.30" ,
"matchCriteriaId" : "E0FA45C5-498B-4160-9CA3-F0A6533ECDFA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.1.0" ,
"versionEndExcluding" : "8.1.29" ,
"matchCriteriaId" : "7DC2EEF8-834B-42A1-8DA3-0C2CF22A7070"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.2.0" ,
"versionEndExcluding" : "8.2.20" ,
"matchCriteriaId" : "A39988FF-D854-4277-9D66-6911AF371DD3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.3.0" ,
"versionEndExcluding" : "8.3.8" ,
"matchCriteriaId" : "F579FFC1-4F81-4755-B14B-3AA73AC9FF7A"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:fedoraproject:fedora:40:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CA277A6C-83EC-4536-9125-97B84C4FAF59"
}
]
}
]
}
] ,
2024-06-09 20:03:11 +00:00
"references" : [
2024-06-10 18:03:10 +00:00
{
"url" : "http://www.openwall.com/lists/oss-security/2024/06/07/1" ,
2024-06-12 14:03:35 +00:00
"source" : "security@php.net" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
2024-06-10 18:03:10 +00:00
} ,
2024-06-09 20:03:11 +00:00
{
"url" : "https://github.com/php/php-src/security/advisories/GHSA-w8qr-v226-r27w" ,
2024-06-12 14:03:35 +00:00
"source" : "security@php.net" ,
"tags" : [
"Exploit" ,
"Vendor Advisory"
]
2024-06-12 04:03:12 +00:00
} ,
2024-06-18 12:03:12 +00:00
{
"url" : "https://lists.debian.org/debian-lts-announce/2024/06/msg00009.html" ,
"source" : "security@php.net"
} ,
2024-06-12 04:03:12 +00:00
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/" ,
2024-06-12 14:03:35 +00:00
"source" : "security@php.net" ,
"tags" : [
"Third Party Advisory"
]
2024-06-13 06:03:10 +00:00
} ,
{
"url" : "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/" ,
"source" : "security@php.net"
2024-07-28 16:03:13 +00:00
} ,
{
"url" : "https://security.netapp.com/advisory/ntap-20240726-0001/" ,
"source" : "security@php.net"
2024-06-09 20:03:11 +00:00
}
]
}