First published: Mon Oct 07 2024(Updated: )
According to <a href="https://www.php.net/manual/en/security.cgi-bin.force-redirect.php">https://www.php.net/manual/en/security.cgi-bin.force-redirect.php</a>, the configuration directive cgi.force_redirect prevents anyone from calling PHP directly with a URL like <a href="http://host.example/cgi-bin/php/secretdir/script.php">http://host.example/cgi-bin/php/secretdir/script.php</a>. The default value of cgi.force_redirect is 1. But there is a bug that can cause attackers to bypass restrictions and access php-cgi directly.
Affected Software | Affected Version | How to fix |
---|---|---|
PHP |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-2317051 is considered to be high due to the potential for unauthorized access to PHP scripts.
To fix REDHAT-BUG-2317051, ensure that the cgi.force_redirect directive is properly configured in your PHP settings.
The vulnerability REDHAT-BUG-2317051 affects the PHP software from The PHP Group.
The potential risks of REDHAT-BUG-2317051 include the possibility of script execution and unauthorized access to sensitive data.
Yes, a patch or security update is typically provided by Red Hat for REDHAT-BUG-2317051.