Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.108692
Category:Web application abuses
Title:PHP 'CVE-2019-11043' FPM RCE Vulnerability - Version Check
Summary:PHP is prone to a remote code execution (RCE) vulnerability in; certain nginx + php-fpm configurations.
Description:Summary:
PHP is prone to a remote code execution (RCE) vulnerability in
certain nginx + php-fpm configurations.

Vulnerability Insight:
The file sapi/fpm/fpm/fpm_main.c contains pointer arithmetic
that assumes that env_path_info has a prefix equal to the path to the php script. However, the
code does not check this assumption is satisfied. The absence of the check can lead to an invalid
pointer in the 'path_info' variable.

Such conditions can be achieved in a pretty standard Nginx configuration. The regexp in
`fastcgi_split_path_info` directive can be broken using the newline character (in encoded form,
%0a). Broken regexp leads to empty PATH_INFO, which triggers the bug.

Vulnerability Impact:
Successful exploitation would allow an unauthenticated remote
attacker to execute arbitrary code on the target machine.

Affected Software/OS:
PHP versions prior to 7.1.33, 7.2.x prior to 7.2.24 and 7.3.x
prior to 7.3.11.

Solution:
Update to version 7.1.33, 7.2.24, 7.3.11 or later.

As an alternative a workaround to update the nginx configuration to mitigate this vulnerability is
described at the PHP.net bugtracker linked in the references.

CVSS Score:
7.5

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2019-11043
Bugtraq: 20200129 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra (Google Search)
https://seclists.org/bugtraq/2020/Jan/44
Debian Security Information: DSA-4552 (Google Search)
https://www.debian.org/security/2019/dsa-4552
Debian Security Information: DSA-4553 (Google Search)
https://www.debian.org/security/2019/dsa-4553
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/
http://seclists.org/fulldisclosure/2020/Jan/40
http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html
https://github.com/neex/phuip-fpizdam
RedHat Security Advisories: RHSA-2019:3286
https://access.redhat.com/errata/RHSA-2019:3286
RedHat Security Advisories: RHSA-2019:3287
https://access.redhat.com/errata/RHSA-2019:3287
RedHat Security Advisories: RHSA-2019:3299
https://access.redhat.com/errata/RHSA-2019:3299
RedHat Security Advisories: RHSA-2019:3300
https://access.redhat.com/errata/RHSA-2019:3300
RedHat Security Advisories: RHSA-2019:3724
https://access.redhat.com/errata/RHSA-2019:3724
RedHat Security Advisories: RHSA-2019:3735
https://access.redhat.com/errata/RHSA-2019:3735
RedHat Security Advisories: RHSA-2019:3736
https://access.redhat.com/errata/RHSA-2019:3736
RedHat Security Advisories: RHSA-2020:0322
https://access.redhat.com/errata/RHSA-2020:0322
SuSE Security Announcement: openSUSE-SU-2019:2441 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html
SuSE Security Announcement: openSUSE-SU-2019:2457 (Google Search)
http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html
https://usn.ubuntu.com/4166-1/
https://usn.ubuntu.com/4166-2/
CopyrightCopyright (C) 2019 Greenbone AG

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.