First published: Mon Jun 06 2022(Updated: )
Fixed bug : Uninitialized array in pg_query_params(). (CVE-2022-31625)
Credit: security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
<8.0.20 | 8.0.20 | |
PHP PHP | >=7.4.0<7.4.30 | |
PHP PHP | >=8.0.0<8.0.20 | |
PHP PHP | >=8.1.0<8.1.7 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
debian/php7.3 | <=7.3.31-1~deb10u1 | 7.3.31-1~deb10u5 |
debian/php7.4 | 7.4.33-1+deb11u4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31625 is a vulnerability in PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, which can lead to remote code execution or denial of service.
CVE-2022-31625 affects PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7 when using the Postgres database extension.
CVE-2022-31625 has a severity rating of 8.1, which is considered high.
CVE-2022-31625 can be exploited by supplying invalid parameters to a parametrized query in PHP, which may lead to remote code execution or denial of service.
Yes, the remedy for CVE-2022-31625 is to update PHP to version 7.4.30, 8.0.20, or 8.1.7 depending on the affected version.