Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2019-11043

Опубликовано: 24 окт. 2019
Источник: redhat
CVSS3: 8.1
EPSS Критический

Описание

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

Отчет

This issue only affects instances running php-fpm under nginx server software as environment paths and parameters are handled by different code pieces depending on the server php-fpm is running under. The code where this issue is found is used exclusively when php-fpm detects the request came through an nginx server. Red Hat Product Security team rated this issue as having a Critical security impact as an attacker may take advantage from the existing bug to cause Remote Code Execution on network exposed software.

Меры по смягчению последствий

  1. Check your nginx configuration files, specially the ones related to php-fpm for presence of pattern bellow on fastcgi_split_path_info regex and PATH_INFO parameter:
fastcgi_split_path_info ^(.+?\.php)(/.*)$; fastcgi_param PATH_INFO $fastcgi_path_info;
  1. If fastcgi_split_path_info regex matches with the one above, for each fastcgi_param PATH_INFO entry perform the following change:
fastcgi_param PATH_INFO $fastcgi_path_info if_not_empty;

This step will allow you to safely continue using PATH_INFO parameter while the patch is not applied. 3) Restart your nginx instance:

systemctl restart nginx

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpNot affected
Red Hat Enterprise Linux 5php53Not affected
Red Hat Software Collectionsrh-php73-phpNot affected
Red Hat Enterprise Linux 6phpFixedRHSA-2019:328731.10.2019
Red Hat Enterprise Linux 7phpFixedRHSA-2019:328631.10.2019
Red Hat Enterprise Linux 7.6 Extended Update SupportphpFixedRHSA-2020:283507.07.2020
Red Hat Enterprise Linux 8phpFixedRHSA-2019:373506.11.2019
Red Hat Enterprise Linux 8phpFixedRHSA-2019:373606.11.2019
Red Hat Enterprise Linux 8.0 Update Services for SAP SolutionsphpFixedRHSA-2020:032203.02.2020
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-php70-phpFixedRHSA-2019:372406.11.2019

Показывать по

Дополнительная информация

Статус:

Critical
Дефект:
CWE-20->CWE-787
https://bugzilla.redhat.com/show_bug.cgi?id=1766378php: underflow in env_path_info in fpm_main.c

EPSS

Процентиль: 100%
0.94114
Критический

8.1 High

CVSS3

Связанные уязвимости

CVSS3: 8.7
ubuntu
больше 5 лет назад

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

CVSS3: 8.7
nvd
больше 5 лет назад

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

CVSS3: 8.7
debian
больше 5 лет назад

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below ...

suse-cvrf
больше 5 лет назад

Security update for php7

suse-cvrf
больше 5 лет назад

Security update for php7

EPSS

Процентиль: 100%
0.94114
Критический

8.1 High

CVSS3