VID |
22942 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP running on the remote web server is 7.2.x prior to 7.2.30. It is, therefore, affected by multiple vulnerabilities: - An out-of-bounds read error exists in urldecode() due to improper data validation checks. An attacker can exploit this, by inserting negative hex values to leak values that are found in the memory before the array. - A NULL byte injection vulnerability exists in shell_exec() and the backtick operator due to improper data sanitization.
* References: https://www.php.net/ChangeLog-7.php#7.2.30
* Platforms Affected: PHP Prior to 7.2.30 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (7.2.30 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
CVE-2020-7067 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|