Vulnerability Name:

CCN-184866

Published:2020-07-07
Updated:2020-07-07
Summary:PHP could allow a remote attacker to bypass security restrictions, caused by out-of-bounds check for FFI::String(), FFI::memcpy and can walk back CDATA object to get a pointer using FFI::addr() call FFI::addr. By sending a specially-crafted request, an attacker could exploit this vulnerability to call system($cmd) without using FFI::load() or FFI::cdefs().
CVSS v3 Severity:9.1 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
8.3 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N/E:P/RL:U/RC:R)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): None
CVSS v2 Severity:9.4 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): None
Vulnerability Consequences:Bypass Security
References:Source: XF
Type: UNKNOWN
php-ffi-sec-bypass(184866)

Source: CCN
Type: Packet Storm Security [07-09-2020]
PHP 7.4 FFI disable_functions Bypass

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [07-07-2020]

Source: CCN
Type: PHP Web site
PHP

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:php:php:7.4.0:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    php php 7.4.0