| VID |
22930 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
According to its banner, the version of PHP running on the remote web server is 7.3.x prior to 7.3.11. It is, therefore, affected by a remote code execution vulnerability due to insufficient validation of user input. An unauthenticated, remote attacker can exploit this, by sending a specially crafted request, to cause the execution of arbitrary code by breaking the fastcgi_split_path_info directive.
* References: https://www.php.net/ChangeLog-7.php#7.3.11 https://bugs.php.net/bug.php?id=78599
* Platforms Affected: PHP Prior to 7.3.11 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of PHP (7.3.11 or later), available from the PHP web site at http://www.php.net/downloads.php |
| Related URL |
CVE-2019-11043 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|