Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2024-8925 CVE-2024-8927 CVE-2024-9026 |
CWE-ID | CWE-20 CWE-254 CWE-778 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Ubuntu Operating systems & Components / Operating system php7.4-fpm (Ubuntu package) Operating systems & Components / Operating system package or component php7.4-cli (Ubuntu package) Operating systems & Components / Operating system package or component php7.4-cgi (Ubuntu package) Operating systems & Components / Operating system package or component libapache2-mod-php7.4 (Ubuntu package) Operating systems & Components / Operating system package or component php8.3-fpm (Ubuntu package) Operating systems & Components / Operating system package or component php8.3-cli (Ubuntu package) Operating systems & Components / Operating system package or component php8.3-cgi (Ubuntu package) Operating systems & Components / Operating system package or component libapache2-mod-php8.3 (Ubuntu package) Operating systems & Components / Operating system package or component php8.1-fpm (Ubuntu package) Other php8.1-cli (Ubuntu package) Other php8.1-cgi (Ubuntu package) Other libapache2-mod-php8.1 (Ubuntu package) Other |
Vendor | Canonical Ltd. |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU97748
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-8925
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient validation of user-supplied input when parsing multipart form data. A remote attacker can pass specially crafted input to the application and bypass implemented security restrictions.
Update the affected package php7.4 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 24.04
php7.4-fpm (Ubuntu package): before 7.4.3-4ubuntu2.24
php7.4-cli (Ubuntu package): before 7.4.3-4ubuntu2.24
php7.4-cgi (Ubuntu package): before 7.4.3-4ubuntu2.24
libapache2-mod-php7.4 (Ubuntu package): before 7.4.3-4ubuntu2.24
php8.1-fpm (Ubuntu package): before 8.1.2-1ubuntu2.19
php8.1-cli (Ubuntu package): before 8.1.2-1ubuntu2.19
php8.1-cgi (Ubuntu package): before 8.1.2-1ubuntu2.19
libapache2-mod-php8.1 (Ubuntu package): before 8.1.2-1ubuntu2.19
php8.3-fpm (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
php8.3-cli (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
php8.3-cgi (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
libapache2-mod-php8.3 (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
CPE2.3https://ubuntu.com/security/notices/USN-7049-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97746
Risk: Medium
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2024-8927
CWE-ID:
CWE-254 - Security Features
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to environment variable collision, which can lead to cgi.force_redirect bypass. A remote attacker can bypass implemented security restriction and gain unauthorized access to the application.
Update the affected package php7.4 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 24.04
php7.4-fpm (Ubuntu package): before 7.4.3-4ubuntu2.24
php7.4-cli (Ubuntu package): before 7.4.3-4ubuntu2.24
php7.4-cgi (Ubuntu package): before 7.4.3-4ubuntu2.24
libapache2-mod-php7.4 (Ubuntu package): before 7.4.3-4ubuntu2.24
php8.1-fpm (Ubuntu package): before 8.1.2-1ubuntu2.19
php8.1-cli (Ubuntu package): before 8.1.2-1ubuntu2.19
php8.1-cgi (Ubuntu package): before 8.1.2-1ubuntu2.19
libapache2-mod-php8.1 (Ubuntu package): before 8.1.2-1ubuntu2.19
php8.3-fpm (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
php8.3-cli (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
php8.3-cgi (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
libapache2-mod-php8.3 (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
CPE2.3https://ubuntu.com/security/notices/USN-7049-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU97747
Risk: Low
CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2024-9026
CWE-ID:
CWE-778 - Insufficient Logging
Exploit availability: No
DescriptionThe vulnerability allows an attacker to alter log files.
The vulnerability exists due to an unspecified error, which can lead to logs from child processes to be altered.
Update the affected package php7.4 to the latest version.
Vulnerable software versionsUbuntu: 20.04 - 24.04
php7.4-fpm (Ubuntu package): before 7.4.3-4ubuntu2.24
php7.4-cli (Ubuntu package): before 7.4.3-4ubuntu2.24
php7.4-cgi (Ubuntu package): before 7.4.3-4ubuntu2.24
libapache2-mod-php7.4 (Ubuntu package): before 7.4.3-4ubuntu2.24
php8.1-fpm (Ubuntu package): before 8.1.2-1ubuntu2.19
php8.1-cli (Ubuntu package): before 8.1.2-1ubuntu2.19
php8.1-cgi (Ubuntu package): before 8.1.2-1ubuntu2.19
libapache2-mod-php8.1 (Ubuntu package): before 8.1.2-1ubuntu2.19
php8.3-fpm (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
php8.3-cli (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
php8.3-cgi (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
libapache2-mod-php8.3 (Ubuntu package): before 8.3.6-0ubuntu0.24.04.2
CPE2.3https://ubuntu.com/security/notices/USN-7049-1
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.