First published: Mon Jul 23 2018(Updated: )
In PHP Runtime for Apache OpenWhisk, a Docker action inheriting one of the Docker tags openwhisk/action-php-v7.2:1.0.0 or openwhisk/action-php-v7.1:1.0.1 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache OpenWhisk | <1.0.1 | |
PHP | =7.2.0 | |
Apache OpenWhisk | <1.0.2 | |
PHP | =7.1.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11756 is classified as a high vulnerability due to the potential for code exploitation in user functions.
To fix CVE-2018-11756, upgrade to Apache OpenWhisk version 1.0.2 or later, and ensure that your Docker actions do not inherit vulnerable configurations.
CVE-2018-11756 affects Apache OpenWhisk versions prior to 1.0.2.
CVE-2018-11756 can affect PHP users running vulnerable Docker actions that are exploited through insecure code within the container.
CVE-2018-11756 is associated with Docker actions inheriting from openwhisk/action-php-v7.1:1.0.1 and openwhisk/action-php-v7.2:1.0.0 or earlier.