| VID |
22932 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
According to its banner, the version of PHP running on the remote web server is prior to 7.1.33. It is, therefore, affected by a remote code execution vulnerability due to insufficient validation of user input. An unauthenticated, remote attacker can exploit this, by sending a specially crafted request, to cause the execution of arbitrary code by breaking the fastcgi_split_path_info directive.
* References: https://www.php.net/ChangeLog-7.php#7.1.33 https://bugs.php.net/bug.php?id=78599 * Platforms Affected: PHP Prior to 7.1.33 Any operating system Any version |
| Recommendation |
Upgrade to the latest version of PHP (7.1.33 or later), available from the PHP web site at http://www.php.net/downloads.php |
| Related URL |
CVE-2019-11043 (CVE) |
| Related URL |
(SecurityFocus) |
| Related URL |
(ISS) |
|