PHP 注入漏洞

admin 2024-01-14 01:19:50 YS 来源:ZONE.CI 全球网 0 阅读模式
> PHP 注入漏洞

PHP 注入漏洞

CNNVD-ID编号 CNNVD-201912-902 CVE编号 CVE-2019-11045
发布时间 2019-12-18 更新时间 2021-01-18
漏洞类型 注入 漏洞来源 Ubuntu,Debian,Red Hat
危险等级 中危 威胁类型 远程
厂商 N/A

漏洞介绍

PHP(PHP:Hypertext Preprocessor,PHP:超文本预处理器)是PHPGroup和开放源代码社区的共同维护的一种开源的通用计算机脚本语言。该语言主要用于Web开发,支持多种数据库及操作系统。

PHP 7.2.26之前的7.2.x版本、7.3.13之前的7.3.x版本和7.4.0版本中存在注入漏洞,该漏洞源于PHP DirectoryIterator接收带有嵌入字符的文件名,并在该字符处进行截断。

漏洞补丁

目前厂商已发布升级了PHP 注入漏洞的补丁,PHP 注入漏洞的补丁获取链接:

参考网址

来源:BUGTRAQ

链接:https://seclists.org/bugtraq/2021/Jan/3

来源:BUGTRAQ

链接:https://seclists.org/bugtraq/2020/Feb/27

来源:DEBIAN

链接:https://www.debian.org/security/2020/dsa-4628

来源:MISC

链接:https://bugs.php.net/bug.php?id=78863

来源:DEBIAN

链接:https://www.debian.org/security/2020/dsa-4626

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20200103-0002/

来源:UBUNTU

链接:https://usn.ubuntu.com/4239-1/

来源:FEDORA

链接:https://lists.fedoraproject.org/archives/list/[email protected]/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/

来源:SUSE

链接:http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html

来源:BUGTRAQ

链接:https://seclists.org/bugtraq/2020/Feb/31

来源:MLIST

链接:https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200101-1.html

来源:usn.ubuntu.com

链接:https://usn.ubuntu.com/4239-1/

来源:www.suse.com

链接:https://www.suse.com/support/update/announcement/2020/suse-su-20200352-1.html

来源:lists.debian.org

链接:https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html

来源:www.debian.org

链接:https://www.debian.org/security/2020/dsa-4628

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4262/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/156423/Debian-Security-Advisory-4628-1.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159094/Red-Hat-Security-Advisory-2020-3662-01.html

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/160292/Red-Hat-Security-Advisory-2020-5275-01.html

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0741/

来源:vigilance.fr

链接:https://vigilance.fr/vulnerability/PHP-multiple-vulnerabilities-31183

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0022/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0652/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0554/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.4296/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0145/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0584/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0442/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.0165/

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3072/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/155958/Ubuntu-Security-Notice-USN-4239-1.html

来源:www.ibm.com

链接:https://www.ibm.com/blogs/psirt/security-bulletin-ibm-api-connect-is-impacted-by-multiple-vulnerabilities-in-php-cve-2019-11045-cve-2019-11044-cve-2019-11046/

受影响实体

暂无

信息来源

http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201912-902

weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
PHP 注入漏洞 YS

PHP 注入漏洞

>PHP 注入漏洞 PHP 注入漏洞CNNVD-ID编号CNNVD-201912-902 CVE编号 CVE-2019-11045
评论:0   参与:  0