Описание
In PHP Runtime for Apache OpenWhisk, a Docker action inheriting one of the Docker tags openwhisk/action-php-v7.2:1.0.0 or openwhisk/action-php-v7.1:1.0.1 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.
Ссылки
- Third Party AdvisoryVDB Entry
- PatchThird Party Advisory
- MitigationTechnical DescriptionThird Party Advisory
- Third Party AdvisoryVDB Entry
- PatchThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.0.1 (исключая)
Одновременно
cpe:2.3:a:apache:openwhisk:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.2.0:*:*:*:*:*:*:*
Конфигурация 2Версия до 1.0.2 (исключая)
Одновременно
cpe:2.3:a:apache:openwhisk:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.1.0:*:*:*:*:*:*:*
EPSS
Процентиль: 92%
0.08163
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
NVD-CWE-noinfo
Связанные уязвимости
CVSS3: 9.8
github
около 3 лет назад
In PHP Runtime for Apache OpenWhisk, a Docker action inheriting one of the Docker tags openwhisk/action-php-v7.2:1.0.0 or openwhisk/action-php-v7.1:1.0.1 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.
EPSS
Процентиль: 92%
0.08163
Низкий
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
NVD-CWE-noinfo