CVE-2019-11045

In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
References
Link Resource
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html Mailing List Third Party Advisory
https://bugs.php.net/bug.php?id=78863 Exploit Mailing List Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/
https://seclists.org/bugtraq/2020/Feb/27 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2020/Feb/31 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2021/Jan/3 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20200103-0002/ Third Party Advisory
https://usn.ubuntu.com/4239-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4626 Third Party Advisory
https://www.debian.org/security/2020/dsa-4628 Third Party Advisory
https://www.tenable.com/security/tns-2021-14 Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html Mailing List Third Party Advisory
https://bugs.php.net/bug.php?id=78863 Exploit Mailing List Patch Vendor Advisory
https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html Mailing List Third Party Advisory
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/
https://seclists.org/bugtraq/2020/Feb/27 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2020/Feb/31 Mailing List Third Party Advisory
https://seclists.org/bugtraq/2021/Jan/3 Mailing List Third Party Advisory
https://security.netapp.com/advisory/ntap-20200103-0002/ Third Party Advisory
https://usn.ubuntu.com/4239-1/ Third Party Advisory
https://www.debian.org/security/2020/dsa-4626 Third Party Advisory
https://www.debian.org/security/2020/dsa-4628 Third Party Advisory
https://www.tenable.com/security/tns-2021-14 Third Party Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.4.0:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:30:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:31:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4 (hide)

cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*

Configuration 5 (hide)

OR cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*
cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*

Configuration 6 (hide)

cpe:2.3:a:tenable:securitycenter:*:*:*:*:*:*:*:*

History

21 Nov 2024, 04:20

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html - Mailing List, Third Party Advisory
References () https://bugs.php.net/bug.php?id=78863 - Exploit, Mailing List, Patch, Vendor Advisory () https://bugs.php.net/bug.php?id=78863 - Exploit, Mailing List, Patch, Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html - Mailing List, Third Party Advisory () https://lists.debian.org/debian-lts-announce/2019/12/msg00034.html - Mailing List, Third Party Advisory
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/ -
References () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/ - () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/ -
References () https://seclists.org/bugtraq/2020/Feb/27 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2020/Feb/27 - Mailing List, Third Party Advisory
References () https://seclists.org/bugtraq/2020/Feb/31 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2020/Feb/31 - Mailing List, Third Party Advisory
References () https://seclists.org/bugtraq/2021/Jan/3 - Mailing List, Third Party Advisory () https://seclists.org/bugtraq/2021/Jan/3 - Mailing List, Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20200103-0002/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20200103-0002/ - Third Party Advisory
References () https://usn.ubuntu.com/4239-1/ - Third Party Advisory () https://usn.ubuntu.com/4239-1/ - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4626 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4626 - Third Party Advisory
References () https://www.debian.org/security/2020/dsa-4628 - Third Party Advisory () https://www.debian.org/security/2020/dsa-4628 - Third Party Advisory
References () https://www.tenable.com/security/tns-2021-14 - Third Party Advisory () https://www.tenable.com/security/tns-2021-14 - Third Party Advisory
CVSS v2 : 4.3
v3 : 5.9
v2 : 4.3
v3 : 3.7

07 Nov 2023, 03:02

Type Values Removed Values Added
References
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/', 'name': 'FEDORA-2019-a54a622670', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • {'url': 'https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/', 'name': 'FEDORA-2019-437d94e271', 'tags': ['Third Party Advisory'], 'refsource': 'FEDORA'}
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/ -
  • () https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/ -

Information

Published : 2019-12-23 03:15

Updated : 2024-11-21 04:20


NVD link : CVE-2019-11045

Mitre link : CVE-2019-11045

CVE.ORG link : CVE-2019-11045


JSON object : View

Products Affected

php

  • php

canonical

  • ubuntu_linux

opensuse

  • leap

debian

  • debian_linux

tenable

  • securitycenter

fedoraproject

  • fedora
CWE
CWE-170

Improper Null Termination

CWE-74

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')