vulnerability

Centos Linux: CVE-2019-11045: Moderate: php:7.3 security, bug fix, and enhancement update (CESA-2020:3662)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Dec 23, 2019
Added
Sep 9, 2020
Modified
May 27, 2021

Description

In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.

Solutions

centos-upgrade-apcu-panelcentos-upgrade-libzipcentos-upgrade-libzip-debuginfocentos-upgrade-libzip-debugsourcecentos-upgrade-libzip-develcentos-upgrade-libzip-toolscentos-upgrade-libzip-tools-debuginfocentos-upgrade-phpcentos-upgrade-php-bcmathcentos-upgrade-php-bcmath-debuginfocentos-upgrade-php-clicentos-upgrade-php-cli-debuginfocentos-upgrade-php-commoncentos-upgrade-php-common-debuginfocentos-upgrade-php-dbacentos-upgrade-php-dba-debuginfocentos-upgrade-php-dbgcentos-upgrade-php-dbg-debuginfocentos-upgrade-php-debuginfocentos-upgrade-php-debugsourcecentos-upgrade-php-develcentos-upgrade-php-embeddedcentos-upgrade-php-embedded-debuginfocentos-upgrade-php-enchantcentos-upgrade-php-enchant-debuginfocentos-upgrade-php-fpmcentos-upgrade-php-fpm-debuginfocentos-upgrade-php-gdcentos-upgrade-php-gd-debuginfocentos-upgrade-php-gmpcentos-upgrade-php-gmp-debuginfocentos-upgrade-php-intlcentos-upgrade-php-intl-debuginfocentos-upgrade-php-jsoncentos-upgrade-php-json-debuginfocentos-upgrade-php-ldapcentos-upgrade-php-ldap-debuginfocentos-upgrade-php-mbstringcentos-upgrade-php-mbstring-debuginfocentos-upgrade-php-mysqlndcentos-upgrade-php-mysqlnd-debuginfocentos-upgrade-php-odbccentos-upgrade-php-odbc-debuginfocentos-upgrade-php-opcachecentos-upgrade-php-opcache-debuginfocentos-upgrade-php-pdocentos-upgrade-php-pdo-debuginfocentos-upgrade-php-pearcentos-upgrade-php-pecl-apcucentos-upgrade-php-pecl-apcu-debuginfocentos-upgrade-php-pecl-apcu-debugsourcecentos-upgrade-php-pecl-apcu-develcentos-upgrade-php-pecl-rrdcentos-upgrade-php-pecl-rrd-debuginfocentos-upgrade-php-pecl-rrd-debugsourcecentos-upgrade-php-pecl-xdebugcentos-upgrade-php-pecl-xdebug-debuginfocentos-upgrade-php-pecl-xdebug-debugsourcecentos-upgrade-php-pecl-zipcentos-upgrade-php-pecl-zip-debuginfocentos-upgrade-php-pecl-zip-debugsourcecentos-upgrade-php-pgsqlcentos-upgrade-php-pgsql-debuginfocentos-upgrade-php-processcentos-upgrade-php-process-debuginfocentos-upgrade-php-recodecentos-upgrade-php-recode-debuginfocentos-upgrade-php-snmpcentos-upgrade-php-snmp-debuginfocentos-upgrade-php-soapcentos-upgrade-php-soap-debuginfocentos-upgrade-php-xmlcentos-upgrade-php-xml-debuginfocentos-upgrade-php-xmlrpccentos-upgrade-php-xmlrpc-debuginfo
Title
Rapid7 Labs

2026 Global Threat Landscape Report

The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.