Use-After-Free Vulnerability in PHP Products by PHP Group
CVE-2024-11235
9.2CRITICAL
Summary
In PHP versions 8.3.* prior to 8.3.19 and 8.4.* prior to 8.4.5, a vulnerability exists that allows an attacker to leverage a code sequence involving the __set handler or the ??= operator together with exceptions. This can lead to a use-after-free condition due to improper handling of memory, especially if the attacker can control memory layout through specially crafted inputs. Successfully exploiting this vulnerability could allow an attacker to execute arbitrary code, posing a significant risk to the integrity and security of applications utilizing the affected PHP versions.
Affected Version(s)
PHP 8.4.* < 8.4.5
PHP 8.3.* < 8.3.19
References
CVSS V4
Score:
9.2
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Junwha Hong