Improper Validation of Syntactic Correctness of Input (CVE-2024-8925)

admin 2024-10-08 22:31:24 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
Improper Validation of Syntactic Correctness of Input (CVE-2024-8925)

CVE编号

CVE-2024-8925

利用情况

暂无

补丁情况

N/A

披露时间

2024-10-07
漏洞描述
A flaw was found in PHP's parsing of multipart form data contents, which affects both file and input form data. This may lead to legitimate data not being processed, violating data integrity. For example, ff a multipart form data payload contains a valid prefix 'X' of the defined boundary B such that 5Kib < |X| < |B| < 8Kib, the logic responsible for parsing and storing the multipart payload fails to correctly extract the contents between two boundaries.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
https://access.redhat.com/security/cve/CVE-2024-8925
https://github.com/php/php-src/commit/48808d98f4fc2a05193cdcc1aedd6c66816450f1
https://github.com/php/php-src/security/advisories/GHSA-9pqp-7h25-4f32
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
系统 alpine_3.20 php82 * Up to (excluding) 8.2.24-r0
运行在以下环境
系统 debian_12 php8.2 * Up to (excluding) 8.2.24-1~deb12u1
运行在以下环境
系统 fedora_39 php * Up to (excluding) 8.2.24-1.fc39
运行在以下环境
系统 fedora_40 php * Up to (excluding) 8.3.12-1.fc40
运行在以下环境
系统 fedora_41 php * Up to (excluding) 8.3.12-1.fc41
运行在以下环境
系统 ubuntu_20.04 php7.4 * Up to (excluding) 7.4.3-4ubuntu2.24
运行在以下环境
系统 ubuntu_22.04 php8.1 * Up to (excluding) 8.1.2-1ubuntu2.19
CVSS3评分 5.3
  • 攻击路径 网络
  • 攻击复杂度 高
  • 权限要求 低
  • 影响范围 未更改
  • 用户交互 无
  • 可用性 无
  • 保密性 无
  • 完整性 高
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N
CWE-ID 漏洞类型
CWE-1286 Improper Validation of Syntactic Correctness of Input
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
CVE-2024-8926 Ali_nvd

CVE-2024-8926

CVE-2024-8926CVE编号 CVE-2024-8926利用情况 暂无补丁情况 N/A披露时间 2024-10-07漏洞描述A flaw was f
评论:0   参与:  0