Critical PHP SOAP Extension Vulnerabilities Enable Remote Code Execution
Severity: High (Score: 72.8)
Sources: Cybersecuritynews, Gbhackers
Summary
A cluster of vulnerabilities in PHP's SOAP extension has been disclosed, allowing unauthenticated Remote Code Execution (RCE) on affected servers. This includes a high-severity flaw that poses a significant risk to numerous web servers. The vulnerabilities stem from memory corruption issues in PHP's core string processing and ext-soap components. Attackers could exploit these flaws to take complete control of vulnerable systems. GitHub security teams have been alerted, and the PHP community is urged to apply patches immediately. The exact number of affected systems is currently unknown, but the potential impact is extensive due to the widespread use of PHP. Security experts recommend immediate action to mitigate risks associated with these vulnerabilities. The situation is evolving as more details emerge. Key Points: • Critical vulnerabilities in PHP's SOAP extension allow unauthenticated RCE. • Numerous web servers are at risk due to widespread PHP usage. • Immediate patching is recommended to mitigate potential exploitation.
Key Entities
- Remote Code Execution (attack_type)
- Cwe-125 - Out-of-bounds Read (cwe)
- Cwe-416 - Use After Free (cwe)
- Cwe-476 - NULL Pointer Dereference (cwe)
- PHP (platform)