vulnerability
Centos Linux: CVE-2019-11045: Moderate: php:7.3 security, bug fix, and enhancement update (CESA-2020:3662)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 4 | (AV:N/AC:M/Au:N/C:P/I:N/A:N) | Dec 23, 2019 | Sep 9, 2020 | May 27, 2021 |
Severity
4
CVSS
(AV:N/AC:M/Au:N/C:P/I:N/A:N)
Published
Dec 23, 2019
Added
Sep 9, 2020
Modified
May 27, 2021
Description
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
Solutions
centos-upgrade-apcu-panelcentos-upgrade-libzipcentos-upgrade-libzip-debuginfocentos-upgrade-libzip-debugsourcecentos-upgrade-libzip-develcentos-upgrade-libzip-toolscentos-upgrade-libzip-tools-debuginfocentos-upgrade-phpcentos-upgrade-php-bcmathcentos-upgrade-php-bcmath-debuginfocentos-upgrade-php-clicentos-upgrade-php-cli-debuginfocentos-upgrade-php-commoncentos-upgrade-php-common-debuginfocentos-upgrade-php-dbacentos-upgrade-php-dba-debuginfocentos-upgrade-php-dbgcentos-upgrade-php-dbg-debuginfocentos-upgrade-php-debuginfocentos-upgrade-php-debugsourcecentos-upgrade-php-develcentos-upgrade-php-embeddedcentos-upgrade-php-embedded-debuginfocentos-upgrade-php-enchantcentos-upgrade-php-enchant-debuginfocentos-upgrade-php-fpmcentos-upgrade-php-fpm-debuginfocentos-upgrade-php-gdcentos-upgrade-php-gd-debuginfocentos-upgrade-php-gmpcentos-upgrade-php-gmp-debuginfocentos-upgrade-php-intlcentos-upgrade-php-intl-debuginfocentos-upgrade-php-jsoncentos-upgrade-php-json-debuginfocentos-upgrade-php-ldapcentos-upgrade-php-ldap-debuginfocentos-upgrade-php-mbstringcentos-upgrade-php-mbstring-debuginfocentos-upgrade-php-mysqlndcentos-upgrade-php-mysqlnd-debuginfocentos-upgrade-php-odbccentos-upgrade-php-odbc-debuginfocentos-upgrade-php-opcachecentos-upgrade-php-opcache-debuginfocentos-upgrade-php-pdocentos-upgrade-php-pdo-debuginfocentos-upgrade-php-pearcentos-upgrade-php-pecl-apcucentos-upgrade-php-pecl-apcu-debuginfocentos-upgrade-php-pecl-apcu-debugsourcecentos-upgrade-php-pecl-apcu-develcentos-upgrade-php-pecl-rrdcentos-upgrade-php-pecl-rrd-debuginfocentos-upgrade-php-pecl-rrd-debugsourcecentos-upgrade-php-pecl-xdebugcentos-upgrade-php-pecl-xdebug-debuginfocentos-upgrade-php-pecl-xdebug-debugsourcecentos-upgrade-php-pecl-zipcentos-upgrade-php-pecl-zip-debuginfocentos-upgrade-php-pecl-zip-debugsourcecentos-upgrade-php-pgsqlcentos-upgrade-php-pgsql-debuginfocentos-upgrade-php-processcentos-upgrade-php-process-debuginfocentos-upgrade-php-recodecentos-upgrade-php-recode-debuginfocentos-upgrade-php-snmpcentos-upgrade-php-snmp-debuginfocentos-upgrade-php-soapcentos-upgrade-php-soap-debuginfocentos-upgrade-php-xmlcentos-upgrade-php-xml-debuginfocentos-upgrade-php-xmlrpccentos-upgrade-php-xmlrpc-debuginfo
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.