CVE-2024-24752

Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and for each which contains a file, it is extracted and saved in `/tmp` with a random filename starting with `bref_upload_`. The flow mimics what plain PHP does but it does not delete the temporary files when the request has been processed. An attacker could fill the Lambda instance disk by performing multiple MultiPart requests containing files. This vulnerability is patched in 2.1.13.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:59

Type Values Removed Values Added
References () https://github.com/brefphp/bref/commit/350788de12880b6fd64c4c318ba995388bec840e - Patch () https://github.com/brefphp/bref/commit/350788de12880b6fd64c4c318ba995388bec840e - Patch
References () https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5 - Exploit, Vendor Advisory () https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5 - Exploit, Vendor Advisory

17 Oct 2024, 17:35

Type Values Removed Values Added
CWE CWE-770

09 Feb 2024, 01:45

Type Values Removed Values Added
First Time Mnapoli bref
Mnapoli
CPE cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*
References () https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5 - () https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5 - Exploit, Vendor Advisory
References () https://github.com/brefphp/bref/commit/350788de12880b6fd64c4c318ba995388bec840e - () https://github.com/brefphp/bref/commit/350788de12880b6fd64c4c318ba995388bec840e - Patch
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

01 Feb 2024, 20:50

Type Values Removed Values Added
Summary Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and for each which contains a file, it is extracted and saved in `/tmp` with a random filename starting with `bref_upload_`. The flow mimics what plain PHP does but it does not delete the temporary files when the request has been processed. An attacker could fill the Lambda instance disk by performing multiple MultiPart requests containing files. This vulnerability is patched in 2.1.12. Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and for each which contains a file, it is extracted and saved in `/tmp` with a random filename starting with `bref_upload_`. The flow mimics what plain PHP does but it does not delete the temporary files when the request has been processed. An attacker could fill the Lambda instance disk by performing multiple MultiPart requests containing files. This vulnerability is patched in 2.1.13.
References
  • () https://github.com/brefphp/bref/commit/350788de12880b6fd64c4c318ba995388bec840e -

01 Feb 2024, 16:17

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-01 16:17

Updated : 2024-11-21 08:59


NVD link : CVE-2024-24752

Mitre link : CVE-2024-24752

CVE.ORG link : CVE-2024-24752


JSON object : View

Products Affected

mnapoli

  • bref
CWE
CWE-400

Uncontrolled Resource Consumption

CWE-770

Allocation of Resources Without Limits or Throttling