First published: Mon Jul 29 2019(Updated: )
Apache VCL versions 2.1 through 2.5 do not properly validate form input when processing a submitted block allocation. The form data is then used as an argument to the php built in function strtotime. This allows for an attack against the underlying implementation of that function. The implementation of strtotime at the time the issue was discovered appeared to be resistant to a malicious attack. However, all VCL systems running versions earlier than 2.5.1 should be upgraded or patched. This vulnerability was found and reported to the Apache VCL project by ADLab of Venustech.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Virtual Computing Lab | >=2.1<=2.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-11773 has a medium severity rating due to its potential to be exploited via improper input validation.
To fix CVE-2018-11773, upgrade Apache VCL to version 2.6 or later where this vulnerability has been addressed.
CVE-2018-11773 affects Apache VCL versions from 2.1 to 2.5 inclusive.
CVE-2018-11773 is an input validation vulnerability that can lead to attacks exploiting the strtotime function in PHP.
Yes, CVE-2018-11773 can potentially be exploited remotely through crafted input submissions.