PHP 7.4.x < 7.4.9 Use-After-Free Vulnerability

low Nessus Plugin ID 139570

Synopsis

The version of PHP running on the remote web server is affected by a use-after-free vulnerability.

Description

According to its self-reported version number, the version of PHP running on the remote web server is 7.4.x prior to 7.4.9. It is, therefore affected by a use-after-free vulnerability in the phar_parse function due to mishandling of the actual_alias variable. An unauthenticated, remote attacker could exploit this issue by dereferencing a freed pointer which could lead to arbitrary code execution.

Solution

Upgrade to PHP version 7.4.9

See Also

https://bugs.php.net/bug.php?id=79797

https://www.php.net/ChangeLog-7.php#7.4.9

Plugin Details

Severity: Low

ID: 139570

File Name: php_7_4_9.nasl

Version: 1.10

Type: remote

Family: CGI abuses

Published: 8/13/2020

Updated: 6/4/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Low

Score: 3.3

CVSS v2

Risk Factor: Low

Base Score: 3.3

Temporal Score: 2.6

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:P

CVSS Score Source: CVE-2020-7068

CVSS v3

Risk Factor: Low

Base Score: 3.6

Temporal Score: 3.3

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:php:php

Required KB Items: www/PHP, installed_sw/PHP

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/6/2020

Vulnerability Publication Date: 8/6/2020

Reference Information

CVE: CVE-2020-7068

IAVA: 2020-A-0373-S