{"api_version":"1","generated_at":"2026-04-23T00:39:30+00:00","cve":"CVE-2019-11043","urls":{"html":"https://cve.report/CVE-2019-11043","api":"https://cve.report/api/cve/CVE-2019-11043.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2019-11043","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2019-11043"},"summary":{"title":"CVE-2019-11043","description":"In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.","state":"PUBLIC","assigner":"security@php.net","published_at":"2019-10-28 15:15:00","updated_at":"2023-11-07 03:02:00"},"problem_types":["CWE-787"],"metrics":[],"references":[{"url":"https://access.redhat.com/errata/RHSA-2019:3299","name":"RHSA-2019:3299","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://security.netapp.com/advisory/ntap-20191031-0003/","name":"https://security.netapp.com/advisory/ntap-20191031-0003/","refsource":"CONFIRM","tags":[],"title":"CVE-2019-11043 PHP Vulnerability in NetApp Products | NetApp Product Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2019/dsa-4552","name":"DSA-4552","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-4552-1 php7.0","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://bugs.php.net/bug.php?id=78599","name":"https://bugs.php.net/bug.php?id=78599","refsource":"CONFIRM","tags":["Exploit","Issue Tracking","Patch","Vendor Advisory"],"title":"PHP :: Sec Bug #78599 :: env_path_info underflow in fpm_main.c can lead to RCE","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://github.com/neex/phuip-fpizdam","name":"https://github.com/neex/phuip-fpizdam","refsource":"MISC","tags":["Exploit","Third Party Advisory"],"title":"GitHub - neex/phuip-fpizdam","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/","name":"FEDORA-2019-4adc49a476","refsource":"","tags":[],"title":"[SECURITY] Fedora 31 Update: php-7.3.11-1.fc31 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.tenable.com/security/tns-2021-14","name":"https://www.tenable.com/security/tns-2021-14","refsource":"CONFIRM","tags":[],"title":"[R1] Tenable.sc 5.19.0 Fixes Multiple Third-party Vulnerabilities - Security Advisory | Tenable®","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://access.redhat.com/errata/RHSA-2020:0322","name":"RHSA-2020:0322","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/","name":"FEDORA-2019-7bb07c3b02","refsource":"","tags":[],"title":"[SECURITY] Fedora 30 Update: php-7.3.11-1.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html","name":"openSUSE-SU-2019:2457","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2019:2457-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:3724","name":"RHSA-2019:3724","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:3300","name":"RHSA-2019:3300","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.apple.com/kb/HT210919","name":"https://support.apple.com/kb/HT210919","refsource":"CONFIRM","tags":[],"title":"About the security content of macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra - Apple Support","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/","name":"FEDORA-2019-4adc49a476","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 31 Update: php-7.3.11-1.fc31 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:3286","name":"RHSA-2019:3286","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://usn.ubuntu.com/4166-1/","name":"USN-4166-1","refsource":"UBUNTU","tags":["Third Party Advisory"],"title":"USN-4166-1: PHP vulnerability | Ubuntu security notices | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://usn.ubuntu.com/4166-2/","name":"USN-4166-2","refsource":"UBUNTU","tags":["Third Party Advisory"],"title":"USN-4166-2: PHP vulnerability | Ubuntu security notices | Ubuntu","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp;utm_medium=RSS","name":"https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp;utm_medium=RSS","refsource":"CONFIRM","tags":[],"title":"","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:3736","name":"RHSA-2019:3736","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html","name":"http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html","refsource":"MISC","tags":[],"title":"PHP-FPM 7.x Remote Code Execution ≈ Packet Storm","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.debian.org/security/2019/dsa-4553","name":"DSA-4553","refsource":"DEBIAN","tags":["Third Party Advisory"],"title":"Debian -- Security Information -- DSA-4553-1 php7.3","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/","name":"FEDORA-2019-7bb07c3b02","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 30 Update: php-7.3.11-1.fc30 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:3735","name":"RHSA-2019:3735","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://access.redhat.com/errata/RHSA-2019:3287","name":"RHSA-2019:3287","refsource":"REDHAT","tags":[],"title":"Red Hat Customer Portal","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/","name":"FEDORA-2019-187ae3128d","refsource":"","tags":[],"title":"[SECURITY] Fedora 29 Update: php-7.2.24-1.fc29 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://seclists.org/bugtraq/2020/Jan/44","name":"20200129 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra","refsource":"BUGTRAQ","tags":[],"title":"Bugtraq: APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html","name":"openSUSE-SU-2019:2441","refsource":"SUSE","tags":[],"title":"[security-announce] openSUSE-SU-2019:2441-1: important: Security update","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp%3Butm_medium=RSS","name":"https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp%3Butm_medium=RSS","refsource":"","tags":[],"title":"myF5","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.synology.com/security/advisory/Synology_SA_19_36","name":"https://www.synology.com/security/advisory/Synology_SA_19_36","refsource":"CONFIRM","tags":[],"title":"Synology Inc.","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://seclists.org/fulldisclosure/2020/Jan/40","name":"20200131 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra","refsource":"FULLDISC","tags":[],"title":"Full Disclosure: APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/","name":"FEDORA-2019-187ae3128d","refsource":"FEDORA","tags":[],"title":"[SECURITY] Fedora 29 Update: php-7.2.24-1.fc29 - package-announce - Fedora Mailing-Lists","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2019-11043","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2019-11043","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"LEGACY","value":"Reported by Emil Lerner.","lang":""}],"nvd_cpes":[{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"esm","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"esm","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"16.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"18.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"19.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"19.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"12.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"esm","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"14.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"esm","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"16.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"18.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"lts","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"19.04","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"canonical","cpe5":"ubuntu_linux","cpe6":"19.10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"10.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"debian","cpe5":"debian_linux","cpe6":"9.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php","cpe5":"php","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2019","cve_id":"11043","vulnerable":"1","versionEndIncluding":"1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"php","cpe5":"php","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2019","cve_id":"11043","cve":"CVE-2019-11043","vendorProject":"PHP","product":"FastCGI Process Manager (FPM)","vulnerabilityName":"PHP FastCGI Process Manager (FPM) Buffer Overflow Vulnerability","dateAdded":"2022-03-25","shortDescription":"In some versions of PHP in certain configurations of FPM setup, it is possible to cause FPM module to write past allocated buffers allowing the possibility of remote code execution.","requiredAction":"Apply updates per vendor instructions.","dueDate":"2022-04-15","knownRansomwareCampaignUse":"Known","notes":"https://nvd.nist.gov/vuln/detail/CVE-2019-11043","cwes":"CWE-120","catalogVersion":"2026.04.22","updated_at":"2026-04-22 20:03:10"},"epss":{"cve_year":"2019","cve_id":"11043","cve":"CVE-2019-11043","epss":"0.940530000","percentile":"0.999020000","score_date":"2026-04-22","updated_at":"2026-04-23 00:03:16"},"legacy_qids":[{"cve":"CVE-2019-11043","qid":"296078","title":"Oracle Solaris 11.4 Support Repository Update (SRU) 16.4.0 Missing (CPUOCT2019)"},{"cve":"CVE-2019-11043","qid":"376904","title":"Alibaba Cloud Linux Security Update for Hypertext Preprocessor (PHP) (ALINUX2-SA-2019:0120)"},{"cve":"CVE-2019-11043","qid":"376936","title":"Alibaba Cloud Linux Security Update for php:7.3 (ALINUX3-SA-2022:0049)"},{"cve":"CVE-2019-11043","qid":"378192","title":"Virtuozzo Linux Security Update for php-xmlrpc (VZLSA-2019:3286)"},{"cve":"CVE-2019-11043","qid":"378309","title":"Virtuozzo Linux Security Update for php-soap (VZLSA-2019:3287)"},{"cve":"CVE-2019-11043","qid":"501133","title":"Alpine Linux Security Update for php7"},{"cve":"CVE-2019-11043","qid":"710123","title":"Gentoo Linux Hypertext Preprocessor (PHP) Arbitrary code execution Vulnerability (GLSA 201910-01)"},{"cve":"CVE-2019-11043","qid":"752878","title":"SUSE Enterprise Linux Security Update for php7 (SUSE-SU-2022:4067-1)"},{"cve":"CVE-2019-11043","qid":"940198","title":"AlmaLinux Security Update for php:7.2 (ALSA-2019:3735)"},{"cve":"CVE-2019-11043","qid":"940274","title":"AlmaLinux Security Update for php:7.3 (ALSA-2019:3736)"},{"cve":"CVE-2019-11043","qid":"960709","title":"Rocky Linux Security Update for php:7.3 (RLSA-2019:3736)"},{"cve":"CVE-2019-11043","qid":"960785","title":"Rocky Linux Security Update for php:7.2 (RLSA-2019:3735)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"security@php.net","DATE_PUBLIC":"2019-10-22T03:18:00.000Z","ID":"CVE-2019-11043","STATE":"PUBLIC","TITLE":"Underflow in PHP-FPM can lead to RCE"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"PHP","version":{"version_data":[{"version_affected":"<","version_name":"7.1.x","version_value":"7.1.33"},{"version_affected":"<","version_name":"7.2.x","version_value":"7.2.24"},{"version_affected":"<","version_name":"7.3.x","version_value":"7.3.11"}]}}]},"vendor_name":"PHP"}]}},"credit":[{"lang":"eng","value":"Reported by Emil Lerner. "}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution."}]},"exploit":[{"lang":"eng","value":"Exploit described at https://github.com/neex/phuip-fpizdam"}],"generator":{"engine":"Vulnogram 0.0.8"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":8.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-120 Buffer Overflow"}]}]},"references":{"reference_data":[{"refsource":"MISC","url":"https://github.com/neex/phuip-fpizdam","name":"https://github.com/neex/phuip-fpizdam"},{"refsource":"CONFIRM","name":"https://bugs.php.net/bug.php?id=78599","url":"https://bugs.php.net/bug.php?id=78599"},{"refsource":"UBUNTU","name":"USN-4166-1","url":"https://usn.ubuntu.com/4166-1/"},{"refsource":"DEBIAN","name":"DSA-4552","url":"https://www.debian.org/security/2019/dsa-4552"},{"refsource":"DEBIAN","name":"DSA-4553","url":"https://www.debian.org/security/2019/dsa-4553"},{"refsource":"UBUNTU","name":"USN-4166-2","url":"https://usn.ubuntu.com/4166-2/"},{"refsource":"CONFIRM","name":"https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp;utm_medium=RSS","url":"https://support.f5.com/csp/article/K75408500?utm_source=f5support&amp;utm_medium=RSS"},{"refsource":"FEDORA","name":"FEDORA-2019-4adc49a476","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T62LF4ZWVV7OMMIZFO6IFO5QLZKK7YRD/"},{"refsource":"CONFIRM","name":"https://security.netapp.com/advisory/ntap-20191031-0003/","url":"https://security.netapp.com/advisory/ntap-20191031-0003/"},{"refsource":"REDHAT","name":"RHSA-2019:3286","url":"https://access.redhat.com/errata/RHSA-2019:3286"},{"refsource":"REDHAT","name":"RHSA-2019:3287","url":"https://access.redhat.com/errata/RHSA-2019:3287"},{"refsource":"REDHAT","name":"RHSA-2019:3299","url":"https://access.redhat.com/errata/RHSA-2019:3299"},{"refsource":"REDHAT","name":"RHSA-2019:3300","url":"https://access.redhat.com/errata/RHSA-2019:3300"},{"refsource":"FEDORA","name":"FEDORA-2019-187ae3128d","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3W23TP6X4H7LB645FYZLUPNIRD5W3EPU/"},{"refsource":"FEDORA","name":"FEDORA-2019-7bb07c3b02","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FSNBUSPKMLUHHOADROKNG5GDWDCRHT5M/"},{"refsource":"SUSE","name":"openSUSE-SU-2019:2441","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00011.html"},{"refsource":"REDHAT","name":"RHSA-2019:3724","url":"https://access.redhat.com/errata/RHSA-2019:3724"},{"refsource":"REDHAT","name":"RHSA-2019:3735","url":"https://access.redhat.com/errata/RHSA-2019:3735"},{"refsource":"REDHAT","name":"RHSA-2019:3736","url":"https://access.redhat.com/errata/RHSA-2019:3736"},{"refsource":"CONFIRM","name":"https://www.synology.com/security/advisory/Synology_SA_19_36","url":"https://www.synology.com/security/advisory/Synology_SA_19_36"},{"refsource":"SUSE","name":"openSUSE-SU-2019:2457","url":"http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00014.html"},{"refsource":"CONFIRM","name":"https://support.apple.com/kb/HT210919","url":"https://support.apple.com/kb/HT210919"},{"refsource":"BUGTRAQ","name":"20200129 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra","url":"https://seclists.org/bugtraq/2020/Jan/44"},{"refsource":"FULLDISC","name":"20200131 APPLE-SA-2020-1-28-2 macOS Catalina 10.15.3, Security Update 2020-001 Mojave, Security Update 2020-001 High Sierra","url":"http://seclists.org/fulldisclosure/2020/Jan/40"},{"refsource":"REDHAT","name":"RHSA-2020:0322","url":"https://access.redhat.com/errata/RHSA-2020:0322"},{"refsource":"MISC","name":"http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html","url":"http://packetstormsecurity.com/files/156642/PHP-FPM-7.x-Remote-Code-Execution.html"},{"refsource":"CONFIRM","name":"https://www.tenable.com/security/tns-2021-14","url":"https://www.tenable.com/security/tns-2021-14"}]},"source":{"defect":["https://bugs.php.net/bug.php?id=78599"],"discovery":"EXTERNAL"},"work_around":[{"lang":"eng","value":"Configuring nginx (or other server that implements the front-end part of the FPM protocol) to check for the existence of the target file before passing it to PHP FPM (e.g. \"try_files $uri =404\" or \"if (-f $uri)\" in nginx) for would prevent this vulnerability from happening. "}]},"nvd":{"publishedDate":"2019-10-28 15:15:00","lastModifiedDate":"2023-11-07 03:02:00","problem_types":["CWE-787"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL"},"exploitabilityScore":3.9,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL","baseScore":7.5},"severity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","versionStartIncluding":"7.1.0","versionEndExcluding":"7.1.33","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","versionStartIncluding":"7.2.0","versionEndExcluding":"7.2.24","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:php:php:*:*:*:*:*:*:*:*","versionStartIncluding":"7.3.0","versionEndExcluding":"7.3.11","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:esm:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:19.04:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:*","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2019","CveId":"11043","Ordinal":"149324","Title":"CVE-2019-11043","CVE":"CVE-2019-11043","Year":"2019"},"notes":[{"CveYear":"2019","CveId":"11043","Ordinal":"1","NoteData":"In PHP versions 7.1.x below 7.1.33, 7.2.x below 7.2.24 and 7.3.x below 7.3.11 in certain configurations of FPM setup it is possible to cause FPM module to write past allocated buffers into the space reserved for FCGI protocol data, thus opening the possibility of remote code execution.","Type":"Description","Title":null},{"CveYear":"2019","CveId":"11043","Ordinal":"2","NoteData":"2019-10-28","Type":"Other","Title":"Published"},{"CveYear":"2019","CveId":"11043","Ordinal":"3","NoteData":"2021-07-22","Type":"Other","Title":"Modified"}]}}}