// For flags

CVE-2019-11043

PHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

27
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.

En PHP versiones 7.1.x anteriores a la versión 7.1.33, versiones 7.2.x anteriores a la versión 7.2.24 y versiones 7.3.x anteriores a 7.3.11, en ciertas configuraciones del FPM setup, es posible causar que el módulo FPM escriba más allá de los búferes asignados en el espacio reservado para datos de protocolo FCGI, abriendo así la posibilidad de ejecución de código remota.

USN-4166-1 fixed a vulnerability in PHP. This update provides the corresponding update for Ubuntu 12.04 ESM and Ubuntu 14.04 ESM. It was discovered that PHP incorrectly handled certain paths when being used in FastCGI configurations. A remote attacker could possibly use this issue to execute arbitrary code. Various other issues were also addressed.

In some versions of PHP in certain configurations of FPM setup, it is possible to cause FPM module to write past allocated buffers allowing the possibility of remote code execution.

*Credits: Reported by Emil Lerner.
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
None
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
No
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2019-04-09 CVE Reserved
  • 2019-10-23 First Exploit
  • 2019-10-24 CVE Published
  • 2022-03-25 Exploited in Wild
  • 2022-04-15 KEV Due Date
  • 2025-02-07 CVE Updated
  • 2025-03-20 EPSS Updated
CWE
  • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
  • CWE-787: Out-of-bounds Write
CAPEC
References (55)
URL Date SRC
https://packetstorm.news/files/id/154974 2019-10-24
https://packetstorm.news/files/id/156642 2020-03-05
https://www.exploit-db.com/exploits/48182 2020-03-09
https://www.exploit-db.com/exploits/47553 2019-10-28
https://github.com/theMiddleBlue/CVE-2019-11043 2019-10-29
https://github.com/jas502n/CVE-2019-11043 2020-08-20
https://github.com/k8gege/CVE-2019-11043 2019-11-11
https://github.com/akamajoris/CVE-2019-11043-Docker 2019-10-28
https://github.com/0th3rs-Security-Team/CVE-2019-11043 2019-11-06
https://github.com/kriskhub/CVE-2019-11043 2020-05-25
https://github.com/AleWong/PHP-FPM-Remote-Code-Execution-Vulnerability-CVE-2019-11043- 2020-07-06
https://github.com/ypereirareis/docker-CVE-2019-11043 2019-10-28
https://github.com/lindemer/CVE-2019-11043 2020-11-20
https://github.com/MRdoulestar/CVE-2019-11043 2019-11-06
https://github.com/ianxtianxt/CVE-2019-11043 2019-10-24
https://github.com/huowen/CVE-2019-11043 2019-10-30
https://github.com/B1gd0g/CVE-2019-11043 2019-10-23
https://github.com/jas9reet/CVE-2019-11043 2022-03-06
https://github.com/tinker-li/CVE-2019-11043 2019-10-23
https://github.com/fairyming/CVE-2019-11043 2019-10-24
https://github.com/corifeo/CVE-2019-11043 2020-07-13
https://github.com/neex/phuip-fpizdam 2025-02-07
https://github.com/shadow-horse/cve-2019-11043 2024-08-12
https://github.com/moniik/CVE-2019-11043_env 2024-08-12
https://github.com/alokaranasinghe/cve-2019-11043 2024-08-12
https://github.com/jptr218/php_hack 2021-09-18
https://bugs.php.net/bug.php?id=78599 2025-02-07
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
>= 7.1.0 < 7.1.33
Search vendor "Php" for product "Php" and version " >= 7.1.0 < 7.1.33"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
>= 7.2.0 < 7.2.24
Search vendor "Php" for product "Php" and version " >= 7.2.0 < 7.2.24"
-
Affected
Php
Search vendor "Php"
Php
Search vendor "Php" for product "Php"
>= 7.3.0 < 7.3.11
Search vendor "Php" for product "Php" and version " >= 7.3.0 < 7.3.11"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04"
esm
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
14.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04"
esm
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
16.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
18.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "18.04"
lts
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
19.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "19.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
19.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "19.10"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
9.0
Search vendor "Debian" for product "Debian Linux" and version "9.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
10.0
Search vendor "Debian" for product "Debian Linux" and version "10.0"
-
Affected