Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2024-AVI-0300
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans PHP. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
References
Title | Publication Time | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "PHP versions 8.3.x ant\u00e9rieures \u00e0 8.3.6", "product": { "name": "PHP", "vendor": { "name": "PHP", "scada": false } } }, { "description": "PHP versions 8.2.x ant\u00e9rieures \u00e0 8.2.18", "product": { "name": "PHP", "vendor": { "name": "PHP", "scada": false } } }, { "description": "PHP versions 8.1.x ant\u00e9rieures \u00e0 8.1.28", "product": { "name": "PHP", "vendor": { "name": "PHP", "scada": false } } } ], "affected_systems_content": null, "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n", "cves": [ { "name": "CVE-2024-3096", "url": "https://www.cve.org/CVERecord?id=CVE-2024-3096" }, { "name": "CVE-2024-2756", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2756" }, { "name": "CVE-2024-1874", "url": "https://www.cve.org/CVERecord?id=CVE-2024-1874" }, { "name": "CVE-2024-2757", "url": "https://www.cve.org/CVERecord?id=CVE-2024-2757" } ], "initial_release_date": "2024-04-12T00:00:00", "last_revision_date": "2024-04-12T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0300", "revisions": [ { "description": "Version initiale", "revision_date": "2024-04-12T00:00:00.000000" } ], "risks": [ { "description": "Ex\u00e9cution de code arbitraire" }, { "description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur" }, { "description": "D\u00e9ni de service" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans PHP. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire et\nun d\u00e9ni de service.\n", "title": "Multiples vuln\u00e9rabilit\u00e9s dans PHP", "vendor_advisories": [ { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 PHP 8.3.6 du 11 avril 2024", "url": "https://www.php.net/ChangeLog-8.php#8.3.6" }, { "published_at": null, "title": "Bulletin de s\u00e9curit\u00e9 PHP 8.2.18 du 11 avril 2024", "url": "https://www.php.net/ChangeLog-8.php#8.2.18" } ] }
CVE-2024-1874 (GCVE-0-2024-1874)
Vulnerability from cvelistv5
Published
2024-04-29 03:57
Modified
2025-02-13 17:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-116 - Improper Encoding or Escaping of Output
Summary
In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:php_group:php:8.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "php", "vendor": "php_group", "versions": [ { "status": "affected", "version": "8.1.0" } ] }, { "cpes": [ "cpe:2.3:a:php_group:php:8.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "php", "vendor": "php_group", "versions": [ { "status": "affected", "version": "8.2.0" } ] }, { "cpes": [ "cpe:2.3:a:php_group:php:8.3.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "php", "vendor": "php_group", "versions": [ { "status": "affected", "version": "8.3.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-1874", "options": [ { "Exploitation": "poc" }, { "Automatable": "yes" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-29T13:05:18.510843Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T18:00:58.913Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-19T07:32:26.967Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/04/12/11" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240510-0009/" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/06/07/1" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/" }, { "tags": [ "x_transferred" ], "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/" }, { "url": "https://www.vicarius.io/vsociety/posts/command-injection-vulnerability-in-php-on-windows-systems-cve-2024-1874-and-cve-2024-5585" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "platforms": [ "Windows" ], "product": "PHP", "vendor": "PHP Group", "versions": [ { "lessThan": "8.1.28", "status": "affected", "version": "8.1.*", "versionType": "semver" }, { "lessThan": "8.2.18", "status": "affected", "version": "8.2.*", "versionType": "semver" }, { "lessThan": "8.3.5", "status": "affected", "version": "8.3.*", "versionType": "semver" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This problem only present in Windows versions of PHP.\u0026nbsp;" } ], "value": "This problem only present in Windows versions of PHP." } ], "credits": [ { "lang": "en", "type": "reporter", "value": "RyotaK" } ], "datePublic": "2024-04-11T17:15:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIn PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.\u0026nbsp;\u003c/p\u003e" } ], "value": "In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "LOW", "baseScore": 9.4, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-116", "description": "CWE-116 Improper Encoding or Escaping of Output", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-13T04:06:17.168Z", "orgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "shortName": "php" }, "references": [ { "url": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254m-w9w7" }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/12/11" }, { "url": "https://security.netapp.com/advisory/ntap-20240510-0009/" }, { "url": "http://www.openwall.com/lists/oss-security/2024/06/07/1" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PKGTQUOA2NTZ3RXN22CSAUJPIRUYRB4B/" }, { "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/W45DBOH56NQDRTOM2DN2LNA2FZIMC3PK/" } ], "source": { "advisory": "https://github.com/php/php-src/security/advisories/GHSA-pc52-254", "discovery": "EXTERNAL" }, "title": "Command injection via array-ish $command parameter of proc_open()", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Using proc_open() string syntax avoids the problem.\u0026nbsp;" } ], "value": "Using proc_open() string syntax avoids the problem." } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "assignerShortName": "php", "cveId": "CVE-2024-1874", "datePublished": "2024-04-29T03:57:35.624Z", "dateReserved": "2024-02-25T04:39:00.479Z", "dateUpdated": "2025-02-13T17:32:26.388Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-2756 (GCVE-0-2024-2756)
Vulnerability from cvelistv5
Published
2024-04-29 03:34
Modified
2025-02-13 17:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host- or __Secure- cookie by PHP applications.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:php:archive_tar:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "archive_tar", "vendor": "php", "versions": [ { "status": "affected", "version": "*" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-2756", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-29T17:19:19.916680Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:30:06.555Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:25:41.700Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/04/12/11" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240510-0008/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "PHP", "vendor": "PHP Group", "versions": [ { "lessThan": "8.1.28", "status": "affected", "version": "8.1.*", "versionType": "semver" }, { "lessThan": "8.2.18", "status": "affected", "version": "8.2.*", "versionType": "semver" }, { "lessThan": "8.3.5", "status": "affected", "version": "8.3.*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Marco Squarcina" } ], "datePublic": "2024-04-11T17:12:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eDue to an incomplete fix to \u003c/span\u003e\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/advisories/GHSA-c43m-486j-j32p\"\u003eCVE-2022-31629\u003c/a\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e, network and same-site attackers can set a standard insecure cookie in the victim\u0027s browser which is treated as a \u003c/span\u003e\u003ccode\u003e__Host-\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;or \u003c/span\u003e\u003ccode\u003e__Secure-\u003c/code\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;cookie by PHP applications.\u0026nbsp;\u003c/span\u003e\u003cbr\u003e" } ], "value": "Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim\u0027s browser which is treated as a __Host-\u00a0or __Secure-\u00a0cookie by PHP applications." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T17:11:03.733Z", "orgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "shortName": "php" }, "references": [ { "url": "https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5j-x4v4" }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/12/11" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html" }, { "url": "https://security.netapp.com/advisory/ntap-20240510-0008/" } ], "source": { "advisory": "https://github.com/php/php-src/security/advisories/GHSA-wpj3-hf5", "discovery": "EXTERNAL" }, "title": "__Host-/__Secure- cookie bypass due to partial CVE-2022-31629 fix", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "assignerShortName": "php", "cveId": "CVE-2024-2756", "datePublished": "2024-04-29T03:34:16.912Z", "dateReserved": "2024-03-21T05:10:24.594Z", "dateUpdated": "2025-02-13T17:46:30.643Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-2757 (GCVE-0-2024-2757)
Vulnerability from cvelistv5
Published
2024-04-29 03:49
Modified
2025-02-13 17:46
Severity ?
VLAI Severity ?
EPSS score ?
Summary
In PHP 8.3.* before 8.3.5, function mb_encode_mimeheader() runs endlessly for some inputs that contain long strings of non-space characters followed by a space. This could lead to a potential DoS attack if a hostile user sends data to an application that uses this function.
References
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:php_group:php:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "php", "vendor": "php_group", "versions": [ { "status": "affected", "version": "8.3" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-2757", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-04-29T11:27:03.875027Z", "version": "2.0.3" }, "type": "ssvc" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-400", "description": "CWE-400 Uncontrolled Resource Consumption", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:30:17.042Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:25:41.969Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/04/12/11" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240510-0011/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "PHP", "vendor": "PHP Group", "versions": [ { "lessThan": "8.3.5", "status": "affected", "version": "8.3.*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Benjamin Gehrels" } ], "datePublic": "2024-04-11T23:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIn PHP 8.3.* before 8.3.5, function\u0026nbsp;mb_encode_mimeheader() runs endlessly for some inputs that contain long strings of non-space characters followed by a space. This could lead to a potential DoS attack if a hostile user sends data to an application that uses this function.\u0026nbsp;\u003cbr\u003e\u003c/p\u003e" } ], "value": "In PHP 8.3.* before 8.3.5, function\u00a0mb_encode_mimeheader() runs endlessly for some inputs that contain long strings of non-space characters followed by a space. This could lead to a potential DoS attack if a hostile user sends data to an application that uses this function." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T16:07:57.618Z", "orgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "shortName": "php" }, "references": [ { "url": "https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hwx-59fq" }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/12/11" }, { "url": "https://security.netapp.com/advisory/ntap-20240510-0011/" } ], "source": { "advisory": "https://github.com/php/php-src/security/advisories/GHSA-fjp9-9hw", "discovery": "EXTERNAL" }, "title": "PHP mb_encode_mimeheader runs endlessly for some inputs", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "assignerShortName": "php", "cveId": "CVE-2024-2757", "datePublished": "2024-04-29T03:49:15.519Z", "dateReserved": "2024-03-21T05:32:12.866Z", "dateUpdated": "2025-02-13T17:46:31.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-3096 (GCVE-0-2024-3096)
Vulnerability from cvelistv5
Published
2024-04-29 03:42
Modified
2025-02-13 17:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-20 - Improper Input Validation
Summary
In PHP version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if a password stored with password_hash() starts with a null byte (\x00), testing a blank string as the password via password_verify() will incorrectly return true.
References
Impacted products
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:php_group:php:8.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "php", "vendor": "php_group", "versions": [ { "status": "affected", "version": "8.1.0" } ] }, { "cpes": [ "cpe:2.3:a:php_group:php:8.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "php", "vendor": "php_group", "versions": [ { "status": "affected", "version": "8.2.0" } ] }, { "cpes": [ "cpe:2.3:a:php_group:php:8.3.0:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "php", "vendor": "php_group", "versions": [ { "status": "affected", "version": "8.3.0" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-3096", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-29T15:14:15.199723Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:32:24.609Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T19:32:42.742Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr" }, { "tags": [ "x_transferred" ], "url": "http://www.openwall.com/lists/oss-security/2024/04/12/11" }, { "tags": [ "x_transferred" ], "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html" }, { "tags": [ "x_transferred" ], "url": "https://security.netapp.com/advisory/ntap-20240510-0010/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "affected", "product": "PHP", "vendor": "PHP Group", "versions": [ { "lessThan": "8.1.28", "status": "affected", "version": "8.1.*", "versionType": "semver" }, { "lessThan": "8.2.18", "status": "affected", "version": "8.2.*", "versionType": "semver" }, { "lessThan": "8.3.5", "status": "affected", "version": "8.3.*", "versionType": "semver" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "Eric Stern" } ], "datePublic": "2024-04-11T22:59:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eIn PHP\u0026nbsp; version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if\u0026nbsp;a password stored with password_hash() starts with a null byte (\\x00), testing a blank string as the password via password_verify() will incorrectly return true.\u003c/p\u003e" } ], "value": "In PHP\u00a0 version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if\u00a0a password stored with password_hash() starts with a null byte (\\x00), testing a blank string as the password via password_verify() will incorrectly return true." } ], "impacts": [ { "capecId": "CAPEC-52", "descriptions": [ { "lang": "en", "value": "CAPEC-52 Embedding NULL Bytes" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-20", "description": "CWE-20 Improper Input Validation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-10T17:09:44.676Z", "orgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "shortName": "php" }, "references": [ { "url": "https://github.com/php/php-src/security/advisories/GHSA-h746-cjrr-wfmr" }, { "url": "http://www.openwall.com/lists/oss-security/2024/04/12/11" }, { "url": "https://lists.debian.org/debian-lts-announce/2024/05/msg00005.html" }, { "url": "https://security.netapp.com/advisory/ntap-20240510-0010/" } ], "source": { "advisory": "https://github.com/php/php-src/security/advisories/GHSA-h746-cjr", "discovery": "EXTERNAL" }, "title": "PHP function password_verify can erroneously return true when argument contains NUL", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Pre-filter potential password strings to ensure they do not contain NUL bytes.\u0026nbsp;" } ], "value": "Pre-filter potential password strings to ensure they do not contain NUL bytes." } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "dd77f84a-d19a-4638-8c3d-a322d820ed2b", "assignerShortName": "php", "cveId": "CVE-2024-3096", "datePublished": "2024-04-29T03:42:04.093Z", "dateReserved": "2024-03-29T16:57:27.435Z", "dateUpdated": "2025-02-13T17:47:50.089Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…