SynopsisThe remote web server uses a version of PHP that is affected by multiple attack vectors.
DescriptionVersions of PHP prior to 7.1.0 are vulnerable to the following issues :
- A flaw exists that is due to 'parse_url' returning the incorrect host. This may allow a remote attacker to have an impact that may include bypassing authentication, or conducting open redirection and server-side request forgery attacks, depending on how the function is implemented.
- An overflow condition exists in the 'dynamicGetbuf()' function in 'gd_io_dp.c'. The issue is triggered as certain input is not properly validated. With a specially crafted string, a remote attacker can cause a stack-based buffer overflow, resulting in a denial of service in a process utilizing the language or potentially allowing the execution of arbitrary code.
- A use-after-free error exists in the 'unserialize()' function related to uses of '__wakeup' which modify properties. This may allow a remote attacker to dereference already freed memory and potentially execute arbitrary code.
- A use-after-free error exists that is triggered when handling unserialized object properties. With a specially crafted request, a remote attacker can dereference already freed memory and potentially execute arbitrary code.
SolutionUpgrade to PHP version 7.1.0 or later.