VID |
22931 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP running on the remote web server is 7.2.x prior to 7.2.24. It is, therefore, affected by a remote code execution vulnerability due to insufficient validation of user input. An unauthenticated, remote attacker can exploit this, by sending a specially crafted request, to cause the execution of arbitrary code by breaking the fastcgi_split_path_info directive.
* References: https://www.php.net/ChangeLog-7.php#7.2.24 https://bugs.php.net/bug.php?id=78599
* Platforms Affected: PHP Prior to 7.2.24 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (7.2.24 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
CVE-2019-11043 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|