VID |
22932 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP running on the remote web server is prior to 7.1.33. It is, therefore, affected by a remote code execution vulnerability due to insufficient validation of user input. An unauthenticated, remote attacker can exploit this, by sending a specially crafted request, to cause the execution of arbitrary code by breaking the fastcgi_split_path_info directive.
* References: https://www.php.net/ChangeLog-7.php#7.1.33 https://bugs.php.net/bug.php?id=78599 * Platforms Affected: PHP Prior to 7.1.33 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (7.1.33 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
CVE-2019-11043 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|