First published: Tue Dec 17 2019(Updated: )
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
Credit: security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
<7.2.26 | 7.2.26 | |
PHP PHP | >=7.2.0<=7.2.26 | |
PHP PHP | >=7.3.0<=7.3.13 | |
PHP PHP | =7.4.0 | |
Tenable SecurityCenter | <5.19.0 | |
Fedoraproject Fedora | =30 | |
Fedoraproject Fedora | =31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-11044 is a vulnerability in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, where the link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte, potentially leading to security vulnerabilities.
The severity of CVE-2019-11044 is high with a severity value of 7.5.
To fix CVE-2019-11044, upgrade PHP to version 7.2.26 or above, 7.3.13 or above, or 7.4.0 or above depending on the affected version.
You can find more information about CVE-2019-11044 at these references: [Reference 1](https://www.php.net/ChangeLog-7.php#7.2.26), [Reference 2](https://bugs.php.net/bug.php?id=78862), [Reference 3](https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/).
The CWE of CVE-2019-11044 is CWE-170.