ID CVE-2018-11756
Summary In PHP Runtime for Apache OpenWhisk, a Docker action inheriting one of the Docker tags openwhisk/action-php-v7.2:1.0.0 or openwhisk/action-php-v7.1:1.0.1 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.
References
Vulnerable Configurations
  • cpe:2.3:a:apache:openwhisk:1.0.0:*:*:*:*:*:*:*
    cpe:2.3:a:apache:openwhisk:1.0.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:7.2.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:7.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:php:php:7.1.0:*:*:*:*:*:*:*
    cpe:2.3:a:php:php:7.1.0:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 03-10-2019 - 00:03)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 104915
confirm https://github.com/apache/incubator-openwhisk-runtime-php/commit/6caf902f527250ee4b7b695929b628d560e0dad1
mlist [openwhisk-dev] 20180720 [CVE] CVE-2018-11756 PHP Runtime for Apache OpenWhisk
Last major update 03-10-2019 - 00:03
Published 23-07-2018 - 17:29
Last modified 03-10-2019 - 00:03
Back to Top