Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2021-21703

Опубликовано: 20 окт. 2021
Источник: redhat
CVSS3: 6.4
EPSS Низкий

Описание

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

php-fpm has a vulnerability which may lead to local privilege escalation. This vulnerability is hard to exploit as the attack needs to escape the FPM sandbox mechanism. When a complete attack is achieved it may lead to risk for confidentiality, data integrity, and system availability.

Отчет

This vulnerability affects only systems with php-fpm enabled on its configuration. For an attack to be completed successfully, the attacker needs to chain this vulnerability with some other vulnerability that allows escape from the FPM sandbox first.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6phpOut of support scope
Red Hat Enterprise Linux 7phpOut of support scope
Red Hat Enterprise Linux 8php:7.3/phpAffected
Red Hat Enterprise Linux 9phpNot affected
Red Hat Enterprise Linux 8phpFixedRHSA-2022:193510.05.2022
Red Hat Software Collections for Red Hat Enterprise Linux 7rh-php73-phpFixedRHSA-2022:549104.07.2022

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-119
https://bugzilla.redhat.com/show_bug.cgi?id=2016535php: Local privilege escalation via PHP-FPM

EPSS

Процентиль: 19%
0.00059
Низкий

6.4 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.8
ubuntu
больше 3 лет назад

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

CVSS3: 7.8
nvd
больше 3 лет назад

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 and 8.0.x below 8.0.12, when running PHP FPM SAPI with main FPM daemon process running as root and child worker processes running as lower-privileged users, it is possible for the child processes to access memory shared with the main process and write to it, modifying it in a way that would cause the root process to conduct invalid memory reads and writes, which can be used to escalate privileges from local unprivileged user to the root user.

CVSS3: 7.8
debian
больше 3 лет назад

In PHP versions 7.3.x up to and including 7.3.31, 7.4.x below 7.4.25 a ...

suse-cvrf
больше 3 лет назад

Security update for php72

suse-cvrf
больше 3 лет назад

Security update for php74

EPSS

Процентиль: 19%
0.00059
Низкий

6.4 Medium

CVSS3