Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

PHP 'CVE-2019-11043' FPM Remote Code Execution Vulnerability (Version Check)

Information

Severity

Severity

High

Family

Family

Web application abuses

CVSSv2 Base

CVSSv2 Base

7.5

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

4 years ago

Modified

Modified

4 years ago

Summary

PHP is prone to a remote code execution vulnerability in certain nginx + php-fpm configurations.

Insight

Insight

The file sapi/fpm/fpm/fpm_main.c contains pointer arithmetic that assumes that env_path_info has a prefix equal to the path to the php script. However, the code does not check this assumption is satisfied. The absence of the check can lead to an invalid pointer in the 'path_info' variable. Such conditions can be achieved in a pretty standard Nginx configuration. The regexp in `fastcgi_split_path_info` directive can be broken using the newline character (in encoded form, %0a). Broken regexp leads to empty PATH_INFO, which triggers the bug.

Affected Software

Affected Software

PHP versions before 7.1.33, 7.2.x before 7.2.24 and 7.3.x before 7.3.11.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to version 7.1.33, 7.2.24, 7.3.11 or later. As an alternative a workaround to update the nginx configuration to mitigate this vulnerability is described at the PHP.net bugtracker linked in the references.

Common Vulnerabilities and Exposures (CVE)