{"api_version":"1","generated_at":"2026-04-23T02:36:07+00:00","cve":"CVE-2020-1899","urls":{"html":"https://cve.report/CVE-2020-1899","api":"https://cve.report/api/cve/CVE-2020-1899.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2020-1899","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2020-1899"},"summary":{"title":"CVE-2020-1899","description":"The unserialize() function supported a type code, \"S\", which was meant to be supported only for APC serialization. This type code allowed arbitrary memory addresses to be accessed as if they were static StringData objects. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0.","state":"PUBLIC","assigner":"cve-assign@fb.com","published_at":"2021-03-11 01:15:00","updated_at":"2021-03-18 14:14:00"},"problem_types":["CWE-119"],"metrics":[],"references":[{"url":"https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9","name":"https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9","refsource":"MISC","tags":["Patch","Third Party Advisory"],"title":"CVE-2020-1899 · facebook/hhvm@1107228 · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://hhvm.com/blog/2020/06/30/security-update.html","name":"https://hhvm.com/blog/2020/06/30/security-update.html","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"Security Update | HHVM","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2020-1899","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2020-1899","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2020","cve_id":"1899","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"facebook","cpe5":"hhvm","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"1899","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"facebook","cpe5":"hhvm","cpe6":"4.57.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"1899","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"facebook","cpe5":"hhvm","cpe6":"4.58.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"1899","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"facebook","cpe5":"hhvm","cpe6":"4.58.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"1899","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"facebook","cpe5":"hhvm","cpe6":"4.59.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"1899","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"facebook","cpe5":"hhvm","cpe6":"4.60.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"1899","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"facebook","cpe5":"hhvm","cpe6":"4.61.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2020","cve_id":"1899","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"facebook","cpe5":"hhvm","cpe6":"4.62.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"cve-assign@fb.com","DATE_ASSIGNED":"2020-06-10","ID":"CVE-2020-1899","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Facebook","product":{"product_data":[{"product_name":"HHVM","version":{"version_data":[{"version_affected":"!>=","version_value":"4.62.1"},{"version_affected":"=","version_value":"4.62.0"},{"version_affected":"!>=","version_value":"4.61.1"},{"version_affected":"=","version_value":"4.61.0"},{"version_affected":"!>=","version_value":"4.60.1"},{"version_affected":"=","version_value":"4.60.0"},{"version_affected":"!>=","version_value":"4.59.1"},{"version_affected":"=","version_value":"4.59.0"},{"version_affected":"!>=","version_value":"4.58.2"},{"version_affected":">=","version_value":"4.58.0"},{"version_affected":"!>=","version_value":"4.57.1"},{"version_affected":"=","version_value":"4.57.0"},{"version_affected":"!>=","version_value":"4.56.1"},{"version_affected":">=","version_value":"4.33.0"},{"version_affected":"!>=","version_value":"4.32.3"},{"version_affected":"<","version_value":"4.32.3"}]}}]}}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The unserialize() function supported a type code, \"S\", which was meant to be supported only for APC serialization. This type code allowed arbitrary memory addresses to be accessed as if they were static StringData objects. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Untrusted Pointer Dereference (CWE-822)"}]}]},"references":{"reference_data":[{"refsource":"CONFIRM","name":"https://hhvm.com/blog/2020/06/30/security-update.html","url":"https://hhvm.com/blog/2020/06/30/security-update.html"},{"refsource":"MISC","name":"https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9","url":"https://github.com/facebook/hhvm/commit/1107228a5128d3ca1c4add8ac1635d933cbbe2e9"}]}},"nvd":{"publishedDate":"2021-03-11 01:15:00","lastModifiedDate":"2021-03-18 14:14:00","problem_types":["CWE-119"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":7.5,"baseSeverity":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE","baseScore":5},"severity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:facebook:hhvm:4.58.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:facebook:hhvm:4.58.1:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:facebook:hhvm:4.59.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:facebook:hhvm:4.60.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:facebook:hhvm:4.61.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:facebook:hhvm:4.62.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:facebook:hhvm:4.57.0:*:*:*:*:*:*:*","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*","versionStartIncluding":"4.33.0","versionEndExcluding":"4.56.1","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:facebook:hhvm:*:*:*:*:*:*:*:*","versionEndExcluding":"4.32.3","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2020","CveId":"1899","Ordinal":"161281","Title":"CVE-2020-1899","CVE":"CVE-2020-1899","Year":"2020"},"notes":[{"CveYear":"2020","CveId":"1899","Ordinal":"1","NoteData":"The unserialize() function supported a type code, \"S\", which was meant to be supported only for APC serialization. This type code allowed arbitrary memory addresses to be accessed as if they were static StringData objects. This issue affected HHVM prior to v4.32.3, between versions 4.33.0 and 4.56.0, 4.57.0, 4.58.0, 4.58.1, 4.59.0, 4.60.0, 4.61.0, 4.62.0.","Type":"Description","Title":null},{"CveYear":"2020","CveId":"1899","Ordinal":"2","NoteData":"2021-03-10","Type":"Other","Title":"Published"},{"CveYear":"2020","CveId":"1899","Ordinal":"3","NoteData":"2021-03-10","Type":"Other","Title":"Modified"}]}}}