Critical PHP RCE Vulnerability Affects NGINX with php-fpm
Security experts warn of a critical remote code execution vulnerability, CVE-2019-11043, affecting certain PHP 7 versions running on NGINX with php-fpm enabled. Organisations using outdated PHP versions are urged to apply security patches immediately.
The vulnerability, first reported in 2019, allows attackers to execute system commands via crafted requests. Affected PHP versions include 7.1.x below 7.1.33, 7.2.x below 7.2.24, and 7.3.x below 7.3.11. Qualys Web Application Scanning (WAS) can identify this issue using QIDs 150270 and 150271.
To mitigate the risk, organisations should update their PHP versions to 7.2.24 or 7.3.11, which contain the fix. Additionally, Qualys Web Application Firewall (WAF) can provide temporary protection using pre-written rules until patches are applied.
Organisations are advised to scan their servers using Qualys WAS after patching to ensure the vulnerability has been successfully addressed. While there's no public list of affected organisations, any running vulnerable PHP versions with NGINX and php-fpm should consider themselves at risk.
Read also:
- Trump announces Chinese leader's confirmation of TikTok agreement
- Hackers Utilize GOLD SALEM to Infiltrate Networks and Evade Security Measures, Deploying Warlock Ransomware
- Strengthening Resistance Against Combined Risks in an Age Characterized by Authoritarian Technology
- Artificial Intelligence with independent agency could potentially intervene in cybercrises.