CVE-2019-11043

critical

Description

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

From the Tenable Blog

CVE-2019-11043: Vulnerability in PHP-FPM Could Lead to Remote Code Execution on nginx
CVE-2019-11043: Vulnerability in PHP-FPM Could Lead to Remote Code Execution on nginx

Published: 2019-10-24

Web servers using nginx and PHP-FPM are vulnerable to this flaw under certain conditions. Background On October 22, security researcher Omar Ganiev published a tweet regarding a “freshly patched” remote code execution vulnerability in PHP-FPM, the FastCGI Process Manager (FPM) for PHP. The tweet includes a link to a GitHub repository containing a proof of concept (PoC) for the vulnerability.

References

http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html

http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html

http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html

https://access.redhat.com/errata/RHSA-2019:3286

https://access.redhat.com/errata/RHSA-2019:3287

https://access.redhat.com/errata/RHSA-2019:3299

https://access.redhat.com/errata/RHSA-2019:3300

https://access.redhat.com/errata/RHSA-2019:3724

https://access.redhat.com/errata/RHSA-2019:3735

https://access.redhat.com/errata/RHSA-2019:3736

https://access.redhat.com/errata/RHSA-2020:0322

https://bugs.php.net/bug.php?id=78599

http://seclists.org/fulldisclosure/2020/Jan/40

https://github.com/neex/phuip-fpizdam

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/

https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/

https://seclists.org/bugtraq/2020/Jan/44

https://security.netapp.com/advisory/ntap-20191031-0003/

https://support.apple.com/kb/HT210919

https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp%3Butm_medium=RSS

https://usn.ubuntu.com/4166-1/

https://usn.ubuntu.com/4166-2/

https://www.debian.org/security/2019/dsa-4552

https://www.debian.org/security/2019/dsa-4553

https://www.tenable.com/security/tns-2021-14

Details

Source: Mitre, NVD

Published: 2019-10-28

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical