Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU77112
Risk: Medium
CVSSv3.1: 4.2 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2023-3247
CWE-ID:
CWE-330 - Use of Insufficiently Random Values
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass authentication.
The vulnerability exists due to a missing error check and insufficient random bytes in HTTP Digest authentication for SOAP. A remote attacker can perform a brute-force attack and bypass authentication process.
Update the affected package php7.4 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 23.04
php7.4-cli (Ubuntu package): before 7.4.3-4ubuntu2.19
php7.4-soap (Ubuntu package): before 7.4.3-4ubuntu2.19
php7.4-cgi (Ubuntu package): before 7.4.3-4ubuntu2.19
php7.4 (Ubuntu package): before 7.4.3-4ubuntu2.19
php8.1-sqlite3 (Ubuntu package): before 8.1.2-1ubuntu2.13
php8.1-cgi (Ubuntu package): before 8.1.12-1ubuntu4.2
libapache2-mod-php8.1 (Ubuntu package): before 8.1.12-1ubuntu4.2
libapache2-mod-php8.0 (Ubuntu package): before 8.1.12-1ubuntu4.2
libapache2-mod-php7.4 (Ubuntu package): before 8.1.12-1ubuntu4.2
php8.1-soap (Ubuntu package): before 8.1.12-1ubuntu4.2
php8.1 (Ubuntu package): before 8.1.12-1ubuntu4.2
php8.1-cli (Ubuntu package): before 8.1.12-1ubuntu4.2
External linkshttp://ubuntu.com/security/notices/USN-6199-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.