ALT-PU-2021-3079-2
Closed vulnerabilities
BDU:2021-01912
Уязвимость функции openssl_encrypt() языка программирования php, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2021-01913
Уязвимость механизма обработки файлов cookie языка программирования php, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-01914
Уязвимость функции URL языка программирования php, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-03159
Уязвимость расширения SOAP интерпретатора PHP, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2021-03559
Уязвимость модуля pdo_firebase интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03703
Уязвимость функции php_url_parse_ex() интерпретатора языка программирования PHP, позволяющая нарушителю осуществить SSRF-атаку
BDU:2021-06176
Уязвимость функции ZipArchive::extractTo интерпретатора PHP, позволяющая нарушителю создать или перезаписать файлы
BDU:2024-07676
Уязвимость интерпретатора языка программирования PHP, связанная с недостаточной проверкой входных данных, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2024-07677
Уязвимость интерпретатора языка программирования PHP, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2024-07679
Уязвимость сценария cgi.force_redirect интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2024-07680
Уязвимость интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2024-11-21
CVE-2020-7069
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when AES-CCM mode is used with openssl_encrypt() function with 12 bytes IV, only first 7 bytes of the IV is actually used. This can lead to both decreased security and incorrect encryption data.
- openSUSE-SU-2020:1703
- openSUSE-SU-2020:1703
- openSUSE-SU-2020:1767
- openSUSE-SU-2020:1767
- https://bugs.php.net/bug.php?id=79601
- https://bugs.php.net/bug.php?id=79601
- FEDORA-2020-4fe6b116e5
- FEDORA-2020-4fe6b116e5
- FEDORA-2020-94763cb98b
- FEDORA-2020-94763cb98b
- FEDORA-2020-4573f0e03a
- FEDORA-2020-4573f0e03a
- GLSA-202012-16
- GLSA-202012-16
- https://security.netapp.com/advisory/ntap-20201016-0001/
- https://security.netapp.com/advisory/ntap-20201016-0001/
- USN-4583-1
- USN-4583-1
- DSA-4856
- DSA-4856
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7070
In PHP versions 7.2.x below 7.2.34, 7.3.x below 7.3.23 and 7.4.x below 7.4.11, when PHP is processing incoming HTTP cookie values, the cookie names are url-decoded. This may lead to cookies with prefixes like __Host confused with cookies that decode to such prefix, thus leading to an attacker being able to forge cookie which is supposed to be secure. See also CVE-2020-8184 for more information.
- http://cve.circl.lu/cve/CVE-2020-8184
- http://cve.circl.lu/cve/CVE-2020-8184
- openSUSE-SU-2020:1703
- openSUSE-SU-2020:1703
- openSUSE-SU-2020:1767
- openSUSE-SU-2020:1767
- https://bugs.php.net/bug.php?id=79699
- https://bugs.php.net/bug.php?id=79699
- https://hackerone.com/reports/895727
- https://hackerone.com/reports/895727
- [debian-lts-announce] 20201006 [SECURITY] [DLA 2397-1] php7.0 security update
- [debian-lts-announce] 20201006 [SECURITY] [DLA 2397-1] php7.0 security update
- FEDORA-2020-4fe6b116e5
- FEDORA-2020-4fe6b116e5
- FEDORA-2020-94763cb98b
- FEDORA-2020-94763cb98b
- FEDORA-2020-4573f0e03a
- FEDORA-2020-4573f0e03a
- GLSA-202012-16
- GLSA-202012-16
- https://security.netapp.com/advisory/ntap-20201016-0001/
- https://security.netapp.com/advisory/ntap-20201016-0001/
- USN-4583-1
- USN-4583-1
- DSA-4856
- DSA-4856
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7071
In PHP versions 7.3.x below 7.3.26, 7.4.x below 7.4.14 and 8.0.0, when validating URL with functions like filter_var($url, FILTER_VALIDATE_URL), PHP will accept an URL with invalid password as valid URL. This may lead to functions that rely on URL being valid to mis-parse the URL and produce wrong data as components of the URL.
- https://bugs.php.net/bug.php?id=77423
- https://bugs.php.net/bug.php?id=77423
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- GLSA-202105-23
- GLSA-202105-23
- https://security.netapp.com/advisory/ntap-20210312-0005/
- https://security.netapp.com/advisory/ntap-20210312-0005/
- DSA-4856
- DSA-4856
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2021-21702
In PHP versions 7.3.x below 7.3.27, 7.4.x below 7.4.15 and 8.0.x below 8.0.2, when using SOAP extension to connect to a SOAP server, a malicious SOAP server could return malformed XML data as a response that would cause PHP to access a null pointer and thus cause a crash.
- https://bugs.php.net/bug.php?id=80672
- https://bugs.php.net/bug.php?id=80672
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- [debian-lts-announce] 20210715 [SECURITY] [DLA 2708-1] php7.0 security update
- GLSA-202105-23
- GLSA-202105-23
- https://security.netapp.com/advisory/ntap-20210312-0005/
- https://security.netapp.com/advisory/ntap-20210312-0005/
- DSA-4856
- DSA-4856
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2021-21704
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using Firebird PDO driver extension, a malicious database server could cause crashes in various database functions, such as getAttribute(), execute(), fetch() and others by returning invalid response data that is not parsed correctly by the driver. This can result in crashes, denial of service or potentially memory corruption.
- https://bugs.php.net/bug.php?id=76448
- https://bugs.php.net/bug.php?id=76448
- https://bugs.php.net/bug.php?id=76449
- https://bugs.php.net/bug.php?id=76449
- https://bugs.php.net/bug.php?id=76450
- https://bugs.php.net/bug.php?id=76450
- https://bugs.php.net/bug.php?id=76452
- https://bugs.php.net/bug.php?id=76452
- GLSA-202209-20
- GLSA-202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://security.netapp.com/advisory/ntap-20211029-0006/
Modified: 2024-11-21
CVE-2021-21705
In PHP versions 7.3.x below 7.3.29, 7.4.x below 7.4.21 and 8.0.x below 8.0.8, when using URL validation functionality via filter_var() function with FILTER_VALIDATE_URL parameter, an URL with invalid password field can be accepted as valid. This can lead to the code incorrectly parsing the URL and potentially leading to other security implications - like contacting a wrong server or making a wrong access decision.
- https://bugs.php.net/bug.php?id=81122
- https://bugs.php.net/bug.php?id=81122
- GLSA-202209-20
- GLSA-202209-20
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://security.netapp.com/advisory/ntap-20211029-0006/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2021-21706
In PHP versions 7.3.x below 7.3.31, 7.4.x below 7.4.24 and 8.0.x below 8.0.11, in Microsoft Windows environment, ZipArchive::extractTo may be tricked into writing a file outside target directory when extracting a ZIP file, thus potentially causing files to be created or overwritten, subject to OS permissions.
Modified: 2025-03-17
CVE-2024-8925
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.
Modified: 2024-10-16
CVE-2024-8926
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using a certain non-standard configurations of Windows codepages, the fixes for CVE-2024-4577 https://github.com/advisories/GHSA-vxpp-6299-mxw3 may still be bypassed and the same command injection related to Windows "Best Fit" codepage behavior can be achieved. This may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc.
Modified: 2025-03-18
CVE-2024-8927
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, HTTP_REDIRECT_STATUS variable is used to check whether or not CGI binary is being run by the HTTP server. However, in certain scenarios, the content of this variable can be controlled by the request submitter via HTTP headers, which can lead to cgi.force_redirect option not being correctly applied. In certain configurations this may lead to arbitrary file inclusion in PHP.
Modified: 2024-10-16
CVE-2024-9026
In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.