PHP 5.6.x < 5.6.35 Security Bypass Vulnerability

medium Nessus Plugin ID 122591

Synopsis

The version of PHP running on the remote web server is affected by a security bypass vulnerability.

Description

According to its banner, the version of PHP running on the remote web server is 5.6.x prior to 5.6.35. It is, therefore, affected by a security bypass vulnerability. Dumpable FPM child processes allow bypassing opcache access controls because fpm_unix.c makes a PR_SET_DUMPABLE prctl call, allowing one user (in a multiuser environment) to obtain sensitive information from the process memory of a second user's PHP applications by running gcore on the PID of the PHP-FPM worker process.

Solution

Upgrade to PHP version 5.6.35 or later.

See Also

http://php.net/ChangeLog-5.php#5.6.35

Plugin Details

Severity: Medium

ID: 122591

File Name: php_5_6_35.nasl

Version: 1.4

Type: remote

Family: CGI abuses

Published: 3/4/2019

Updated: 5/28/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: Low

Base Score: 1.9

Temporal Score: 1.4

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2018-10545

CVSS v3

Risk Factor: Medium

Base Score: 4.7

Temporal Score: 4.1

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:php:php

Required KB Items: www/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No known exploits are available

Patch Publication Date: 3/29/2018

Vulnerability Publication Date: 3/29/2018

Reference Information

CVE: CVE-2018-10545

BID: 104022