Amazon Linux AMI : php72, php73 (ALAS-2020-1425)

low Nessus Plugin ID 148126

Synopsis

The remote Amazon Linux AMI host is missing a security update.

Description

The version of php72 installed on the remote host is prior to 7.2.33-1.25. The version of php73 installed on the remote host is prior to 7.3.21-1.28. It is, therefore, affected by a vulnerability as referenced in the ALAS-2020-1425 advisory.

The flaw is in phar_parse_zipfile() of ext/phar/zip.c. When processing a PHP archive file (phar), if a persistent entry is used as defined in php.ini, then memory pointed to by the actual_alias pointer is freed. Directly after the free, the actual_alias pointer is passed to zend_hash_str_add_ptr, where it is dereferenced. Prior to the function call, a copy of the memory pointed to by actual_alias is duplicated and assigned to the mydata->alias pointer. The patch simply uses the unfreed mydata->alias pointer as an argument to the zend_hash_add_str() call rather than the freed memory pointed to by actual_alias.

To trigger this flaw, an attacker needs to place a specially crafted file on the server's filesystem and then load it with PHP. The attacker also needs a setting to be present in PHP's configuration file. Due to this, the attack complexity is high as an attacker would need to find other flaws or already have admin access to the server machine to do this. (CVE-2020-7068)

Tenable has extracted the preceding description block directly from the tested product security advisory.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Run 'yum update php72' to update your system.
Run 'yum update php73' to update your system.

See Also

https://alas.aws.amazon.com/ALAS-2020-1425.html

https://access.redhat.com/security/cve/CVE-2020-7068

Plugin Details

Severity: Low

ID: 148126

File Name: ala_ALAS-2020-1425.nasl

Version: 1.4

Type: local

Agent: unix

Published: 3/25/2021

Updated: 12/11/2024

Supported Sensors: Agentless Assessment, Continuous Assessment, Frictionless Assessment Agent, Frictionless Assessment AWS, Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.3

CVSS v2

Risk Factor: Low

Base Score: 3.3

Temporal Score: 2.6

Vector: CVSS2#AV:L/AC:M/Au:N/C:P/I:N/A:P

CVSS Score Source: CVE-2020-7068

CVSS v3

Risk Factor: Low

Base Score: 3.6

Temporal Score: 3.3

Vector: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: p-cpe:/a:amazon:linux:php73-devel, p-cpe:/a:amazon:linux:php72-odbc, p-cpe:/a:amazon:linux:php73-cli, p-cpe:/a:amazon:linux:php72-pspell, p-cpe:/a:amazon:linux:php72-snmp, p-cpe:/a:amazon:linux:php72-dbg, p-cpe:/a:amazon:linux:php72-xml, p-cpe:/a:amazon:linux:php73-gd, cpe:/o:amazon:linux, p-cpe:/a:amazon:linux:php72-enchant, p-cpe:/a:amazon:linux:php72-embedded, p-cpe:/a:amazon:linux:php72-gmp, p-cpe:/a:amazon:linux:php72-pdo, p-cpe:/a:amazon:linux:php72-soap, p-cpe:/a:amazon:linux:php72-pdo-dblib, p-cpe:/a:amazon:linux:php73-fpm, p-cpe:/a:amazon:linux:php72-bcmath, p-cpe:/a:amazon:linux:php73-mysqlnd, p-cpe:/a:amazon:linux:php73-pdo-dblib, p-cpe:/a:amazon:linux:php73-process, p-cpe:/a:amazon:linux:php72-devel, p-cpe:/a:amazon:linux:php73-embedded, p-cpe:/a:amazon:linux:php73-enchant, p-cpe:/a:amazon:linux:php73-imap, p-cpe:/a:amazon:linux:php72-debuginfo, p-cpe:/a:amazon:linux:php72-dba, p-cpe:/a:amazon:linux:php73-debuginfo, p-cpe:/a:amazon:linux:php73-json, p-cpe:/a:amazon:linux:php73-odbc, p-cpe:/a:amazon:linux:php73-opcache, p-cpe:/a:amazon:linux:php73-pspell, p-cpe:/a:amazon:linux:php73-dba, p-cpe:/a:amazon:linux:php73-tidy, p-cpe:/a:amazon:linux:php73-snmp, p-cpe:/a:amazon:linux:php72, p-cpe:/a:amazon:linux:php72-ldap, p-cpe:/a:amazon:linux:php73-common, p-cpe:/a:amazon:linux:php73-recode, p-cpe:/a:amazon:linux:php72-tidy, p-cpe:/a:amazon:linux:php72-mbstring, p-cpe:/a:amazon:linux:php72-common, p-cpe:/a:amazon:linux:php72-recode, p-cpe:/a:amazon:linux:php73-xml, p-cpe:/a:amazon:linux:php72-fpm, p-cpe:/a:amazon:linux:php73, p-cpe:/a:amazon:linux:php73-soap, p-cpe:/a:amazon:linux:php72-mysqlnd, p-cpe:/a:amazon:linux:php72-intl, p-cpe:/a:amazon:linux:php73-bcmath, p-cpe:/a:amazon:linux:php72-cli, p-cpe:/a:amazon:linux:php72-imap, p-cpe:/a:amazon:linux:php72-xmlrpc, p-cpe:/a:amazon:linux:php73-mbstring, p-cpe:/a:amazon:linux:php72-json, p-cpe:/a:amazon:linux:php72-process, p-cpe:/a:amazon:linux:php73-ldap, p-cpe:/a:amazon:linux:php73-dbg, p-cpe:/a:amazon:linux:php73-pgsql, p-cpe:/a:amazon:linux:php73-pdo, p-cpe:/a:amazon:linux:php73-intl, p-cpe:/a:amazon:linux:php72-gd, p-cpe:/a:amazon:linux:php72-opcache, p-cpe:/a:amazon:linux:php72-pgsql, p-cpe:/a:amazon:linux:php73-xmlrpc, p-cpe:/a:amazon:linux:php73-gmp

Required KB Items: Host/local_checks_enabled, Host/AmazonLinux/release, Host/AmazonLinux/rpm-list

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/26/2020

Vulnerability Publication Date: 8/13/2020

Reference Information

CVE: CVE-2020-7068

ALAS: 2020-1425