First published: Mon Jul 23 2018(Updated: )
In PHP Runtime for Apache OpenWhisk, a Docker action inheriting one of the Docker tags openwhisk/action-php-v7.2:1.0.0 or openwhisk/action-php-v7.1:1.0.1 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenWhisk | <1.0.1 | |
PHP PHP | =7.2.0 | |
Apache OpenWhisk | <1.0.2 | |
PHP PHP | =7.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.