Skip to content

Critical PHP RCE Vulnerability Affects NGINX with php-fpm

Outdated PHP versions put your servers at risk. Update now to avoid system command execution via crafted requests.

In this image I see a woman who is lying and she is holding a camera. In the background I see the...
In this image I see a woman who is lying and she is holding a camera. In the background I see the lamp.

Critical PHP RCE Vulnerability Affects NGINX with php-fpm

Security experts warn of a critical remote code execution vulnerability, CVE-2019-11043, affecting certain PHP 7 versions running on NGINX with php-fpm enabled. Organisations using outdated PHP versions are urged to apply security patches immediately.

The vulnerability, first reported in 2019, allows attackers to execute system commands via crafted requests. Affected PHP versions include 7.1.x below 7.1.33, 7.2.x below 7.2.24, and 7.3.x below 7.3.11. Qualys Web Application Scanning (WAS) can identify this issue using QIDs 150270 and 150271.

To mitigate the risk, organisations should update their PHP versions to 7.2.24 or 7.3.11, which contain the fix. Additionally, Qualys Web Application Firewall (WAF) can provide temporary protection using pre-written rules until patches are applied.

Organisations are advised to scan their servers using Qualys WAS after patching to ensure the vulnerability has been successfully addressed. While there's no public list of affected organisations, any running vulnerable PHP versions with NGINX and php-fpm should consider themselves at risk.

Read also:

Latest