CVE-2019-11045
23.12.2019, 03:15
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
Vendor | Product | Version |
---|---|---|
php | php | 7.2.0 ≤ 𝑥 ≤ 7.2.26 |
php | php | 7.3.0 ≤ 𝑥 ≤ 7.3.13 |
php | php | 7.4.0 |
debian | debian_linux | 8.0 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
opensuse | leap | 15.1 |
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 16.04 |
canonical | ubuntu_linux | 18.04 |
canonical | ubuntu_linux | 19.04 |
canonical | ubuntu_linux | 19.10 |
tenable | securitycenter | 𝑥 < 5.19.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
php5 |
| ||||||||||
php7.0 |
| ||||||||||
php7.2 |
| ||||||||||
php7.3 |
|
Common Weakness Enumeration
- CWE-170 - Improper Null TerminationThe software does not terminate or incorrectly terminates a string or array with a null character or equivalent terminator.
- CWE-74 - Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')The software constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
References