{ "id": "CVE-2021-37704", "sourceIdentifier": "security-advisories@github.com", "published": "2021-08-12T20:15:07.267", "lastModified": "2024-11-21T06:15:44.877", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "PhpFastCache is a high-performance backend cache system (packagist package phpfastcache/phpfastcache). In versions before 6.1.5, 7.1.2, and 8.0.7 the `phpinfo()` can be exposed if the `/vendor` is not protected from public access. This is a rare situation today since the vendor directory is often located outside the web directory or protected via server rule (.htaccess, etc). Only the v6, v7 and v8 will be patched respectively in 8.0.7, 7.1.2, 6.1.5. Older versions such as v5, v4 are not longer supported and will **NOT** be patched. As a workaround, protect the `/vendor` directory from public access." }, { "lang": "es", "value": "PhpFastCache es un sistema de cach\u00e9 backend de alto rendimiento (paquete phpfastcache/phpfastcache). En versiones anteriores a 6.1.5, 7.1.2 y 8.0.7 la funci\u00f3n \"phpinfo()\" puede quedar expuesto si el directorio \"/vendor\" no est\u00e1 protegido del acceso p\u00fablico. Esta es una situaci\u00f3n rara hoy en d\u00eda ya que el directorio vendor suele estar situado fuera del directorio web o protegido por medio de una regla del servidor (.htaccess, etc). S\u00f3lo las versiones v6, v7 y v8 ser\u00e1n parcheadas respectivamente en las versiones 8.0.7, 7.1.2, 6.1.5. Las versiones m\u00e1s antiguas, como la v5 y la v4, ya no son compatibles y **NO** ser\u00e1n parcheadas. Como soluci\u00f3n, proteja el directorio \"/vendor\" del acceso p\u00fablico" } ], "metrics": { "cvssMetricV31": [ { "source": "security-advisories@github.com", "type": "Secondary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L", "baseScore": 5.4, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "LOW" }, "exploitabilityScore": 2.8, "impactScore": 2.5 }, { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N", "baseScore": 4.3, "baseSeverity": "MEDIUM", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "NONE", "scope": "UNCHANGED", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "exploitabilityScore": 2.8, "impactScore": 1.4 } ], "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:S/C:P/I:N/A:N", "baseScore": 4.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "SINGLE", "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "availabilityImpact": "NONE" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 8.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "security-advisories@github.com", "type": "Secondary", "description": [ { "lang": "en", "value": "CWE-200" } ] }, { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-668" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:phpfastcache:phpfastcache:*:*:*:*:*:*:*:*", "versionEndExcluding": "6.1.5", "matchCriteriaId": "0852CDF4-1F56-4960-B7D5-44AD3FD957BB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpfastcache:phpfastcache:*:*:*:*:*:*:*:*", "versionStartIncluding": "7.0.0", "versionEndExcluding": "7.1.2", "matchCriteriaId": "06617709-8C59-4065-8765-5CC1C05D6569" }, { "vulnerable": true, "criteria": "cpe:2.3:a:phpfastcache:phpfastcache:*:*:*:*:*:*:*:*", "versionStartIncluding": "8.0.0", "versionEndExcluding": "8.0.7", "matchCriteriaId": "A2650926-F8E5-41D3-AEF1-7FD8ADC29CAA" } ] } ] } ], "references": [ { "url": "https://github.com/PHPSocialNetwork/phpfastcache/blob/master/CHANGELOG.md#807", "source": "security-advisories@github.com", "tags": [ "Release Notes", "Third Party Advisory" ] }, { "url": "https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51", "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/813", "source": "security-advisories@github.com", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/814", "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/815", "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc", "source": "security-advisories@github.com", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/flextype/flextype/issues/567", "source": "security-advisories@github.com", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ] }, { "url": "https://packagist.org/packages/phpfastcache/phpfastcache", "source": "security-advisories@github.com", "tags": [ "Product", "Third Party Advisory" ] }, { "url": "https://github.com/PHPSocialNetwork/phpfastcache/blob/master/CHANGELOG.md#807", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Release Notes", "Third Party Advisory" ] }, { "url": "https://github.com/PHPSocialNetwork/phpfastcache/commit/41a77d0d8f126dbd6fbedcd9e6a82e86cdaafa51", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/813", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Third Party Advisory" ] }, { "url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/814", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/PHPSocialNetwork/phpfastcache/pull/815", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/PHPSocialNetwork/phpfastcache/security/advisories/GHSA-cvh5-p6r6-g2qc", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ] }, { "url": "https://github.com/flextype/flextype/issues/567", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Issue Tracking", "Third Party Advisory" ] }, { "url": "https://packagist.org/packages/phpfastcache/phpfastcache", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Product", "Third Party Advisory" ] } ] }