当前位置:网站首页>Cloud security daily 220705: the red hat PHP interpreter has found a vulnerability of executing arbitrary code, which needs to be upgraded as soon as possible
Cloud security daily 220705: the red hat PHP interpreter has found a vulnerability of executing arbitrary code, which needs to be upgraded as soon as possible
2022-07-05 17:17:00 【TechWeb】
7 month 4 Japan , Red hat has released a security update , Fixed red hat PHP Arbitrary code execution vulnerability found in the embedded scripting language interpreter . Here are the details of the vulnerability :
Vulnerability Details
source :https://access.redhat.com/errata/RHSA-2022:5491
1.CVE-2022-31625 CVSS score :8.1 severity : important
because pg_query_params() Uninitialized array in function , stay PHP A hole was found in . Use Postgres Database expansion , Providing invalid parameters for parameterized queries may result in PHP Try using uninitialized data as a pointer to free memory . This vulnerability allows remote attackers to control query parameters to execute arbitrary code on the system or may cause a denial of service .
2.CVE-2022-31626 CVSS score :7.5 severity : high
stay mysqlnd_wireprotocol.c In dealing with mysqlnd/pdo When the password in , stay PHP A buffer overflow vulnerability was found in . When using with mysqlnd Driver's pdo_mysql When expanding , If a third party is allowed to provide a password for the connecting host , An overly long password will trigger PHP Buffer overflow in . This vulnerability allows a remote attacker to pass through PDO Put the password ( Too long ) Pass to MySQL The server , This triggers arbitrary code execution on the target system .
3.CVE-2021-21703 CVSS score :6.4 severity : secondary
php-fpm There is a loophole , It may lead to local permission elevation . This vulnerability is difficult to exploit , Because the attack needs to escape FPM Sandbox mechanism . When a complete attack is achieved , May lead to confidentiality 、 Risks in data integrity and system availability .
4.CVE-2021-21707 CVSS score :5.3 severity : secondary
stay php.ini A flaw was found in . The main reason for this vulnerability is parsing extensible markup language (XML) The input validation of entity is incorrect . Special characters may allow attackers to traverse directories . The biggest threat of this vulnerability is confidentiality .
Affected products and versions
Red Hat Software Collections (for RHEL Server) 1 for RHEL 7 x86_64
Red Hat Software Collections (for RHEL Server for System Z) 1 for RHEL 7 s390x
Red Hat Software Collections (for RHEL Server for IBM Power LE) 1 for RHEL 7 ppc64le
Red Hat Software Collections (for RHEL Workstation) 1 for RHEL 7 x86_64
Solution
RedHat The official has Red Hat Software Collections Provide rh-php73-php Security update for . After installing the updated package , Must be restarted httpd The daemon can make the update take effect .
For more information on how to apply this update , see also :
https://access.redhat.com/articles/11258
View more vulnerability information And upgrade, please visit the official website :
https://access.redhat.com/security/security-updates/#/security-advisories
边栏推荐
- Jarvis OJ Telnet Protocol
- NPM installation
- 腾讯音乐上线新产品“曲易买”,提供音乐商用版权授权
- Is it safe to open futures accounts online? Will there be more liars online? Doesn't feel very reliable?
- Is it safe for qiniu business school to open a stock account? Is it reliable?
- 7.Scala类
- Little knowledge about C language (array and string)
- Judge whether a string is a full letter sentence
- Use JDBC technology and MySQL database management system to realize the function of course management, including adding, modifying, querying and deleting course information.
- The second day of learning C language for Asian people
猜你喜欢
![[Jianzhi offer] 63 Maximum profit of stock](/img/b6/c1dec97a23ac13aa53d1d202b83ef5.png)
[Jianzhi offer] 63 Maximum profit of stock

Embedded -arm (bare board development) -2

一个满分的项目文档是如何书写的|得物技术

thinkphp3.2.3

Wsl2.0 installation

Browser rendering principle and rearrangement and redrawing

【jmeter】jmeter脚本高级写法:接口自动化脚本内全部为变量,参数(参数可jenkins配置),函数等实现完整业务流测试
![[first lecture on robot coordinate system]](/img/3c/af056f0fe68b3244a3dc491ceb291d.png)
[first lecture on robot coordinate system]

腾讯音乐上线新产品“曲易买”,提供音乐商用版权授权
mysql中取出json字段的小技巧
随机推荐
Embedded-c Language-2
网上办理期货开户安全吗?网上会不会骗子比较多?感觉不太靠谱?
调查显示传统数据安全工具面对勒索软件攻击的失败率高达 60%
Judge whether a number is a prime number (prime number)
dried food! Semi supervised pre training dialogue model space
[Jianzhi offer] 63 Maximum profit of stock
【testlink】TestLink1.9.18常见问题解决方法
7. Scala class
npm安装
C#实现水晶报表绑定数据并实现打印3-二维码条形码
C#(Winform) 当前线程不在单线程单元中,因此无法实例化 ActiveX 控件
项目引入jar从私服Nexus 拉去遇到的一个问题
Copy mode DMA
张平安:加快云上数字创新,共建产业智慧生态
[7.7 live broadcast preview] the lecturer of "typical architecture of SaaS cloud native applications" teaches you to easily build cloud native SaaS applications. Once the problem is solved, Huawei's s
Iphone14 with pill screen may trigger a rush for Chinese consumers
关于mysql中的json解析函数JSON_EXTRACT
叩富网开期货账户安全可靠吗?怎么分辨平台是否安全?
Wsl2.0 installation
Machine learning 02: model evaluation