Skip to content

Commit ea29b8b

Browse files
committed
Automatic github actions updates. Changes found @lightswitch05
1 parent 4a878b9 commit ea29b8b

File tree

1 file changed

+10
-10
lines changed

1 file changed

+10
-10
lines changed

docs/rules-v1.json

Lines changed: 10 additions & 10 deletions
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"lastUpdatedDate": "2024-06-11T02:04:27+0000",
2+
"lastUpdatedDate": "2024-06-11T13:25:43+0000",
33
"name": "PHP Version Audit",
44
"website": "https://github.com/lightswitch05/php-version-audit",
55
"licence": "https://github.com/lightswitch05/php-version-audit/blob/master/LICENSE",
@@ -3599,7 +3599,7 @@
35993599
"id": "CVE-2012-1823",
36003600
"baseScore": 7.5,
36013601
"publishedDate": "2012-05-11T10:15:00+0000",
3602-
"lastModifiedDate": "2018-01-18T02:29:00+0000",
3602+
"lastModifiedDate": "2024-06-10T17:16:00+0000",
36033603
"description": "sapi/cgi/cgi_main.c in PHP before 5.3.12 and 5.4.x before 5.4.2, when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case."
36043604
},
36053605
"CVE-2012-2143": {
@@ -5657,49 +5657,49 @@
56575657
"id": "CVE-2024-1874",
56585658
"baseScore": null,
56595659
"publishedDate": "2024-04-29T04:15:00+0000",
5660-
"lastModifiedDate": "2024-05-01T17:15:00+0000",
5660+
"lastModifiedDate": "2024-06-10T17:16:00+0000",
56615661
"description": "In PHP versions 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell.\u00a0\n\n"
56625662
},
56635663
"CVE-2024-2756": {
56645664
"id": "CVE-2024-2756",
56655665
"baseScore": null,
56665666
"publishedDate": "2024-04-29T04:15:00+0000",
5667-
"lastModifiedDate": "2024-05-08T01:15:00+0000",
5667+
"lastModifiedDate": "2024-06-10T18:15:00+0000",
56685668
"description": "Due to an incomplete fix to CVE-2022-31629 https://github.com/advisories/GHSA-c43m-486j-j32p , network and same-site attackers can set a standard insecure cookie in the victim's browser which is treated as a __Host-\u00a0or __Secure-\u00a0cookie by PHP applications.\u00a0\n"
56695669
},
56705670
"CVE-2024-2757": {
56715671
"id": "CVE-2024-2757",
56725672
"baseScore": null,
56735673
"publishedDate": "2024-04-29T04:15:00+0000",
5674-
"lastModifiedDate": "2024-05-01T17:15:00+0000",
5674+
"lastModifiedDate": "2024-06-10T17:16:00+0000",
56755675
"description": "In PHP 8.3.* before 8.3.5, function\u00a0mb_encode_mimeheader() runs endlessly for some inputs that contain long strings of non-space characters followed by a space. This could lead to a potential DoS attack if a hostile user sends data to an application that uses this function.\u00a0\n\n"
56765676
},
56775677
"CVE-2024-3096": {
56785678
"id": "CVE-2024-3096",
56795679
"baseScore": null,
56805680
"publishedDate": "2024-04-29T04:15:00+0000",
5681-
"lastModifiedDate": "2024-05-08T01:15:00+0000",
5681+
"lastModifiedDate": "2024-06-10T18:15:00+0000",
56825682
"description": "In PHP\u00a0 version 8.1.* before 8.1.28, 8.2.* before 8.2.18, 8.3.* before 8.3.5, if\u00a0a password stored with password_hash() starts with a null byte (\\x00), testing a blank string as the password via password_verify() will incorrectly return true.\n\n"
56835683
},
56845684
"CVE-2024-4577": {
56855685
"id": "CVE-2024-4577",
5686-
"baseScore": null,
5686+
"baseScore": 9.8,
56875687
"publishedDate": "2024-06-09T20:15:00+0000",
5688-
"lastModifiedDate": "2024-06-10T03:15:00+0000",
5688+
"lastModifiedDate": "2024-06-10T17:16:00+0000",
56895689
"description": "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, when using Apache and PHP-CGI on Windows, if the system is set up to use certain code pages, Windows may use \"Best-Fit\" behavior to replace characters in command line given to\u00a0Win32 API functions. PHP CGI module may misinterpret those characters as PHP options, which may allow a malicious user to pass options to PHP binary being run, and thus reveal the source code of scripts, run arbitrary PHP code on the server, etc."
56905690
},
56915691
"CVE-2024-5458": {
56925692
"id": "CVE-2024-5458",
56935693
"baseScore": null,
56945694
"publishedDate": "2024-06-09T19:15:00+0000",
5695-
"lastModifiedDate": "2024-06-10T02:52:00+0000",
5695+
"lastModifiedDate": "2024-06-10T17:16:00+0000",
56965696
"description": "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, due to a code logic error, filtering functions such as filter_var when validating URLs\u00a0(FILTER_VALIDATE_URL) for certain types of URLs the function will result in invalid user information (username + password part of URLs) being treated as valid user information. This may lead to the downstream code accepting invalid URLs as valid and parsing them incorrectly."
56975697
},
56985698
"CVE-2024-5585": {
56995699
"id": "CVE-2024-5585",
57005700
"baseScore": null,
57015701
"publishedDate": "2024-06-09T19:15:00+0000",
5702-
"lastModifiedDate": "2024-06-10T02:52:00+0000",
5702+
"lastModifiedDate": "2024-06-10T17:16:00+0000",
57035703
"description": "In PHP versions\u00a08.1.* before 8.1.29, 8.2.* before 8.2.20, 8.3.* before 8.3.8, the fix for\u00a0CVE-2024-1874 does not work if the command name includes trailing spaces. Original issue:\u00a0when using proc_open() command with array syntax, due to insufficient escaping, if the arguments of the executed command are controlled by a malicious user, the user can supply arguments that would execute arbitrary commands in Windows shell."
57045704
}
57055705
}

0 commit comments

Comments
 (0)