vulnerability

Amazon Linux AMI 2: CVE-2024-11234: Security patch for php (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
Nov 24, 2024
Added
Feb 26, 2025
Modified
Feb 27, 2025

Description

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.

Solutions

amazon-linux-ami-2-upgrade-phpamazon-linux-ami-2-upgrade-php-bcmathamazon-linux-ami-2-upgrade-php-cliamazon-linux-ami-2-upgrade-php-commonamazon-linux-ami-2-upgrade-php-dbaamazon-linux-ami-2-upgrade-php-dbgamazon-linux-ami-2-upgrade-php-debuginfoamazon-linux-ami-2-upgrade-php-develamazon-linux-ami-2-upgrade-php-embeddedamazon-linux-ami-2-upgrade-php-enchantamazon-linux-ami-2-upgrade-php-fpmamazon-linux-ami-2-upgrade-php-gdamazon-linux-ami-2-upgrade-php-gmpamazon-linux-ami-2-upgrade-php-intlamazon-linux-ami-2-upgrade-php-ldapamazon-linux-ami-2-upgrade-php-mbstringamazon-linux-ami-2-upgrade-php-mysqlndamazon-linux-ami-2-upgrade-php-odbcamazon-linux-ami-2-upgrade-php-opcacheamazon-linux-ami-2-upgrade-php-pdoamazon-linux-ami-2-upgrade-php-pgsqlamazon-linux-ami-2-upgrade-php-processamazon-linux-ami-2-upgrade-php-pspellamazon-linux-ami-2-upgrade-php-snmpamazon-linux-ami-2-upgrade-php-soapamazon-linux-ami-2-upgrade-php-sodiumamazon-linux-ami-2-upgrade-php-xml
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.