// For flags

CVE-2024-11233

Single byte overread with convert.quoted-printable-decode filter

Severity Score

4.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error inĀ convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, due to an error in convert.quoted-printable-decode filter certain data can lead to buffer overread by one byte, which can in certain circumstances lead to crashes or disclose content of other memory areas.

It was discovered that PHP incorrectly handled certain inputs when processed with convert.quoted-printable decode filters. An attacker could possibly use this issue to expose sensitive information or cause a crash. It was discovered that PHP incorrectly handled certain HTTP requests. An attacker could possibly use this issue to performing arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.

*Credits: Frostb1te
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
None
Availability
Low
Attack Vector
Network
Attack Complexity
High
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-11-15 CVE Reserved
  • 2024-11-24 CVE Published
  • 2024-11-24 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-122: Heap-based Buffer Overflow
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
PHP Group
Search vendor "PHP Group"
PHP
Search vendor "PHP Group" for product "PHP"
>= 8.1.0 < 8.1.31
Search vendor "PHP Group" for product "PHP" and version " >= 8.1.0 < 8.1.31"
en
Affected
PHP Group
Search vendor "PHP Group"
PHP
Search vendor "PHP Group" for product "PHP"
>= 8.2.0 < 8.2.26
Search vendor "PHP Group" for product "PHP" and version " >= 8.2.0 < 8.2.26"
en
Affected
PHP Group
Search vendor "PHP Group"
PHP
Search vendor "PHP Group" for product "PHP"
>= 8.3.0 < 8.3.14
Search vendor "PHP Group" for product "PHP" and version " >= 8.3.0 < 8.3.14"
en
Affected