Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2021-21706 |
CWE-ID | CWE-36 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
PHP Universal components / Libraries / Scripting languages |
Vendor | PHP Group |
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU56905
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2021-21706
CWE-ID:
CWE-36 - Absolute Path Traversal
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker overwrite files on the system.
The vulnerability exists due to insufficient filtration of file names in the php_zip_make_relative_path() function on Windows systems. A remote attacker can construct a specially crafted ZIP archive, which once extracted by the ZipArchive::extractTo() function, can overwrite files outside of the destination directory.
Successful exploitation of the vulnerability may allow an attacker to overwrite arbitrary files on the system with privileges of the web server, but requires that the web application is running on Windows.
Install updates from vendor's website.
Vulnerable software versionsPHP: 7.4 - 7.4.23, 7.3 - 7.3.30, 8.0.0 - 8.0.10
http://www.php.net/ChangeLog-7.php#7.4.24
http://bugs.php.net/bug.php?id=81420
http://www.php.net/ChangeLog-7.php#7.3.31
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?