Korean
<< Back
VID 22942
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description According to its banner, the version of PHP running on the remote web server is 7.2.x prior to 7.2.30. It is, therefore, affected by multiple vulnerabilities:
- An out-of-bounds read error exists in urldecode() due to improper data validation checks. An attacker can exploit this, by inserting negative hex values to leak values that are found in the memory before the array.
- A NULL byte injection vulnerability exists in shell_exec() and the backtick operator due to improper data sanitization.

* References:
https://www.php.net/ChangeLog-7.php#7.2.30

* Platforms Affected:
PHP Prior to 7.2.30
Any operating system Any version
Recommendation Upgrade to the latest version of PHP (7.2.30 or later), available from the PHP web site at http://www.php.net/downloads.php
Related URL CVE-2020-7067 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)