First published: Mon Jul 03 2023(Updated: )
It was discovered that PHP incorrectly handled certain Digest authentication for SOAP. An attacker could possibly use this issue to expose sensitive information.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/php8.1-cli | <8.1.12-1ubuntu4.2 | 8.1.12-1ubuntu4.2 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/php8.1 | <8.1.12-1ubuntu4.2 | 8.1.12-1ubuntu4.2 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/php8.1-soap | <8.1.12-1ubuntu4.2 | 8.1.12-1ubuntu4.2 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/libapache2-mod-php7.4 | <8.1.12-1ubuntu4.2 | 8.1.12-1ubuntu4.2 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/libapache2-mod-php8.0 | <8.1.12-1ubuntu4.2 | 8.1.12-1ubuntu4.2 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/libapache2-mod-php8.1 | <8.1.12-1ubuntu4.2 | 8.1.12-1ubuntu4.2 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/php8.1-cgi | <8.1.12-1ubuntu4.2 | 8.1.12-1ubuntu4.2 |
Ubuntu | =23.04 | |
All of | ||
ubuntu/php8.1-cli | <8.1.7-1ubuntu3.5 | 8.1.7-1ubuntu3.5 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/php8.1 | <8.1.7-1ubuntu3.5 | 8.1.7-1ubuntu3.5 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/php8.1-soap | <8.1.7-1ubuntu3.5 | 8.1.7-1ubuntu3.5 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/libapache2-mod-php7.4 | <8.1.7-1ubuntu3.5 | 8.1.7-1ubuntu3.5 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/libapache2-mod-php8.0 | <8.1.7-1ubuntu3.5 | 8.1.7-1ubuntu3.5 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/libapache2-mod-php8.1 | <8.1.7-1ubuntu3.5 | 8.1.7-1ubuntu3.5 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/php8.1-cgi | <8.1.7-1ubuntu3.5 | 8.1.7-1ubuntu3.5 |
Ubuntu | =22.10 | |
All of | ||
ubuntu/php8.1-cli | <8.1.2-1ubuntu2.13 | 8.1.2-1ubuntu2.13 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/php8.1 | <8.1.2-1ubuntu2.13 | 8.1.2-1ubuntu2.13 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/php8.1-sqlite3 | <8.1.2-1ubuntu2.13 | 8.1.2-1ubuntu2.13 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/php8.1-soap | <8.1.2-1ubuntu2.13 | 8.1.2-1ubuntu2.13 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libapache2-mod-php7.4 | <8.1.2-1ubuntu2.13 | 8.1.2-1ubuntu2.13 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libapache2-mod-php8.0 | <8.1.2-1ubuntu2.13 | 8.1.2-1ubuntu2.13 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libapache2-mod-php8.1 | <8.1.2-1ubuntu2.13 | 8.1.2-1ubuntu2.13 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/php8.1-cgi | <8.1.2-1ubuntu2.13 | 8.1.2-1ubuntu2.13 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/php7.4 | <7.4.3-4ubuntu2.19 | 7.4.3-4ubuntu2.19 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libapache2-mod-php7.4 | <7.4.3-4ubuntu2.19 | 7.4.3-4ubuntu2.19 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/php7.4-cgi | <7.4.3-4ubuntu2.19 | 7.4.3-4ubuntu2.19 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/php7.4-soap | <7.4.3-4ubuntu2.19 | 7.4.3-4ubuntu2.19 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/php7.4-cli | <7.4.3-4ubuntu2.19 | 7.4.3-4ubuntu2.19 |
Ubuntu | =20.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of USN-6199-1 is moderate.
The affected software includes PHP versions 8.1.12-1ubuntu4.2, 8.1.7-1ubuntu3.5, 8.1.2-1ubuntu2.13, 7.4.3-4ubuntu2.19.
An attacker could exploit the vulnerability in USN-6199-1 to expose sensitive information by incorrectly handling certain Digest authentication for SOAP.
To fix the vulnerability, update PHP to the latest version provided in the remedy field of the affected software section.
You can find more information about USN-6199-1 on the Ubuntu Security Notices page and the referenced links.