Логотип exploitDog
bind:CVE-2024-24754
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-24754

Количество 2

Количество 2

nvd логотип

CVE-2024-24754

около 2 лет назад

Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and its content added in the `$files` or `$parsedBody` arrays. The conversion process produces a different output compared to the one of plain PHP when keys ending with and open square bracket ([) are used. Based on the application logic the difference in the body parsing might lead to vulnerabilities and/or undefined behaviors. This vulnerability is patched in 2.1.13.

CVSS3: 3.7
EPSS: Низкий
github логотип

GHSA-82vx-mm6r-gg8w

около 2 лет назад

Bref vulnerable to Body Parsing Inconsistency in Event-Driven Functions

CVSS3: 3.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-24754

Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and its content added in the `$files` or `$parsedBody` arrays. The conversion process produces a different output compared to the one of plain PHP when keys ending with and open square bracket ([) are used. Based on the application logic the difference in the body parsing might lead to vulnerabilities and/or undefined behaviors. This vulnerability is patched in 2.1.13.

CVSS3: 3.7
0%
Низкий
около 2 лет назад
github логотип
GHSA-82vx-mm6r-gg8w

Bref vulnerable to Body Parsing Inconsistency in Event-Driven Functions

CVSS3: 3.7
0%
Низкий
около 2 лет назад

Уязвимостей на страницу