Vulnerability Details : CVE-2023-0568
Potential exploit
In PHP 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3, core path resolution function allocate buffer one byte too small. When resolving paths with lengths close to system MAXPATHLEN setting, this may lead to the byte after the allocated buffer being overwritten with NUL value, which might lead to unauthorized data access or modification.
Products affected by CVE-2023-0568
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Threat overview for CVE-2023-0568
Top countries where our scanners detected CVE-2023-0568
Top open port discovered on systems with this issue
80
IPs affected by CVE-2023-0568 95,641
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2023-0568!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2023-0568
0.26%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 65 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-0568
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
8.1
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H |
2.2
|
5.9
|
NIST | |
7.5
|
HIGH | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H |
1.6
|
5.9
|
PHP Group | |
7.5
|
HIGH | AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H |
N/A
|
N/A
|
Oracle:CPUOct2023 |
CWE ids for CVE-2023-0568
-
The product does not correctly calculate the size to be used when allocating a buffer, which could lead to a buffer overflow.Assigned by: security@php.net (Secondary)
-
The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2023-0568
-
https://bugs.php.net/bug.php?id=81746
PHP :: Sec Bug #81746 :: 1-byte array overrun in common path resolve codeExploit;Issue Tracking;Patch;Vendor Advisory
-
https://security.netapp.com/advisory/ntap-20230517-0001/
February 2023 PHP Vulnerabilities in NetApp Products | NetApp Product Security
Jump to