SynopsisThe version of PHP running on the remote web server is affected by multiple vulnerabilities.
DescriptionAccording to its banner, the version of PHP running on the remote web server is either 7.2.x prior to 7.2.28, 7.3.x prior to 7.3.15, or 7.4.x prior to 7.4.3. It is, therefore, affected by multiple vulnerabilities:
- A heap-based buffer overflow condition exists in phar_extract_file() function due to incorrect loop termination. An unauthenticated, remote attacker can exploit this to cause a denial of service condition or the execution of arbitrary code. (CVE-2020-7061)
- A denial of service (DoS) vulnerability exists in PHP SessionUpload Progress functions due to Null Pointer Dereference. An unauthenticated, remote attacker can exploit this issue to cause the php service to stop responding. (CVE-2020-7062)
- An Insecure File Permissions on the buildFromIterator function gives all access permission to Tar files. (CVE-2020-7063)
SolutionUpgrade to PHP version 7.2.28, 7.3.15, 7.4.3 or later.