ArchLinux: 201910-14: php: arbitrary code execution

    Date28 Oct 2019
    Posted ByLinuxSecurity Advisories
    The package php before version 7.3.11-1 is vulnerable to arbitrary code execution.
    Arch Linux Security Advisory ASA-201910-14
    Severity: Critical
    Date    : 2019-10-25
    CVE-ID  : CVE-2019-11043
    Package : php
    Type    : arbitrary code execution
    Remote  : Yes
    Link    :
    The package php before version 7.3.11-1 is vulnerable to arbitrary code
    Upgrade to 7.3.11-1.
    # pacman -Syu "php>=7.3.11-1"
    The problem has been fixed upstream in version 7.3.11.
    If nginx and php-fpm share the same filesystem, one can first check the
    script actually exists, so the malicious request will never make it to
    php-fpm (it is usually done using something like `try_files $uri
    =404`). Or there may be cgi.fix_pathinfo=0 which will also prevent
    A buffer underflow issue has been found in the php-fpm component of php
    before 7.3.11, 7.2.24 and 7.1.33, leading to remote code execution in
    certain nginx + php-fpm configurations. This vulnerability can be
    exploited if the fastcgi_split_path_info directive contains a regexp
    that can be broken by an attacker by supplying %0a in the path info
    which results in the fastcgi_param PATH_INFO being empty.
    A remote attacker is able to execute arbitrary code on the affected
    host by supplying %0a in the path info if php-fpm is used with a
    vulnerable nginx configuration.
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the articles on LinuxSecurity?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"87","title":"Excellent, don't change a thing!","votes":"66","type":"x","order":"1","pct":57.39,"resources":[]},{"id":"88","title":"Should be more technical","votes":"15","type":"x","order":"2","pct":13.04,"resources":[]},{"id":"89","title":"Should include more HOWTOs","votes":"34","type":"x","order":"3","pct":29.57,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.