Korean
<< Back
VID 22931
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description According to its banner, the version of PHP running on the remote web server is 7.2.x prior to 7.2.24. It is, therefore, affected by a remote code execution vulnerability due to insufficient validation of user input. An unauthenticated, remote attacker can exploit this, by sending a specially crafted request, to cause the execution of arbitrary code by breaking the fastcgi_split_path_info directive.

* References:
https://www.php.net/ChangeLog-7.php#7.2.24 https://bugs.php.net/bug.php?id=78599

* Platforms Affected:
PHP Prior to 7.2.24
Any operating system Any version
Recommendation Upgrade to the latest version of PHP (7.2.24 or later), available from the PHP web site at http://www.php.net/downloads.php
Related URL CVE-2019-11043 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)