VID |
22948 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its self-reported version number, the version of PHP running on the remote web server is 7.3.x prior to 7.3.21. It is, therefore affected by a use-after-free vulnerability in the phar_parse function due to mishandling of the actual_alias variable. An unauthenticated, remote attacker could exploit this issue by dereferencing a freed pointer which could lead to arbitrary code execution.
* References: https://bugs.php.net/bug.php?id=79797 https://www.php.net/ChangeLog-7.php#7.3.21
* Platforms Affected: PHP Prior to 7.3.21 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (7.3.21 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
CVE-2020-7068 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|