First published: Thu Dec 26 2019(Updated: )
A vulnerability was found in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access. Reference: <a href="https://bugs.php.net/bug.php?id=78863">https://bugs.php.net/bug.php?id=78863</a>
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <7.2.26 | |
PHP | <7.3.13 | |
PHP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-1786572 is considered high due to potential security vulnerabilities that could arise from improper path handling in affected PHP versions.
To fix REDHAT-BUG-1786572, update PHP to version 7.2.26, 7.3.13, or later.
PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13, and 7.4.0 are affected by REDHAT-BUG-1786572.
The impact of REDHAT-BUG-1786572 could lead to security vulnerabilities in applications that handle filenames with embedded \0 bytes.
There are no well-documented workarounds for REDHAT-BUG-1786572; updating to a secure version is the recommended solution.