Skip to content

Commit aad0b70

Browse files
committed
Automatic github actions updates. Changes found @lightswitch05
1 parent a50c5ef commit aad0b70

File tree

1 file changed

+8
-8
lines changed

1 file changed

+8
-8
lines changed

docs/rules-v1.json

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"lastUpdatedDate": "2024-06-13T02:03:48+0000",
2+
"lastUpdatedDate": "2024-06-13T13:25:31+0000",
33
"name": "PHP Version Audit",
44
"website": "https://github.com/lightswitch05/php-version-audit",
55
"licence": "https://github.com/lightswitch05/php-version-audit/blob/master/LICENSE",
@@ -3599,7 +3599,7 @@
35993599
"id": "CVE-2012-1823",
36003600
"baseScore": 7.5,
36013601
"publishedDate": "2012-05-11T10:15:00+0000",
3602-
"lastModifiedDate": "2024-06-12T02:15:00+0000",
3602+
"lastModifiedDate": "2024-06-13T04:15:00+0000",
36033603
"description": "sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case."
36043604
},
36053605
"CVE-2012-2143": {
@@ -5657,7 +5657,7 @@
56575657
"id": "CVE-2024-1874",
56585658
"baseScore": null,
56595659
"publishedDate": "2024-04-29T04:15:00+0000",
5660-
"lastModifiedDate": "2024-06-12T02:15:00+0000",
5660+
"lastModifiedDate": "2024-06-13T04:15:00+0000",
56615661
"description": "In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.\u00a0\n\n"
56625662
},
56635663
"CVE-2024-2756": {
@@ -5685,21 +5685,21 @@
56855685
"id": "CVE-2024-4577",
56865686
"baseScore": 9.8,
56875687
"publishedDate": "2024-06-09T20:15:00+0000",
5688-
"lastModifiedDate": "2024-06-12T02:15:00+0000",
5688+
"lastModifiedDate": "2024-06-13T04:15:00+0000",
56895689
"description": "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use \"Best-Fit\" behavior to replace characters in command line given to\u00a0Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc."
56905690
},
56915691
"CVE-2024-5458": {
56925692
"id": "CVE-2024-5458",
5693-
"baseScore": null,
5693+
"baseScore": 5.3,
56945694
"publishedDate": "2024-06-09T19:15:00+0000",
5695-
"lastModifiedDate": "2024-06-12T02:15:00+0000",
5695+
"lastModifiedDate": "2024-06-13T04:15:00+0000",
56965696
"description": "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs\u00a0(FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly."
56975697
},
56985698
"CVE-2024-5585": {
56995699
"id": "CVE-2024-5585",
5700-
"baseScore": null,
5700+
"baseScore": 8.8,
57015701
"publishedDate": "2024-06-09T19:15:00+0000",
5702-
"lastModifiedDate": "2024-06-12T02:15:00+0000",
5702+
"lastModifiedDate": "2024-06-13T04:15:00+0000",
57035703
"description": "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for\u00a0CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue:\u00a0when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell."
57045704
}
57055705
}

0 commit comments

Comments
 (0)