• Thursday, October 31, 2019

New PHP Flaw Could Let Attackers Hack Sites Running On Nginx Servers

 

A couple of days ago, Emil ‘Neex’ Lerner, a Russia-based security researcher, disclosed a remote code execution vulnerability in PHP 7 – the latest iteration of the hugely popular web development language. 

 

With this vulnerability, which has the CVE-ID of 2019-11043, an attacker could force a remote webserver to execute their own arbitrary code simply by accessing a crafted URL. The attacker only needs to add “?a=” to the website address, followed by their payload.

 

Web servers using nginx and PHP-FPM are vulnerable and its documented in CVE-2019-11043. This exploit allows for remote code execution on some NGINX and php-fpm configurations. If you do not run NGINX, this exploit does not affect you.  

 

Upgrade your php packages to the latest version. A new release that fixes the issue is released on 24th October. See https://www.php.net/archive/2019.php#2019-10-24-1  

 

Upstream php packages with the fix are:

  • 7.1.33
  •  7.2.24
  •  7.3.11

 

Site owners who are unable to update their PHP install can mitigate the problem by changing the nginx configuration.

 

This vulnerable NGINX and PHP-FPM configuration looks like the following example:

 

 

We should add $try_files $fastcgi_script_name =404; to mitigate this should become:

 

 

Then restart your web server and the issue will be mitigated. 

 

If you need more details regarding the issue and any assistance required in mitigating this vulnerability, please get in touch with us.