Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU91107
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2024-5458
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to bypass implemented security restrictions.
The vulnerability exists due to insufficient validation of user-supplied input when parsing URL. A remote attacker can bypass the filter_var FILTER_VALIDATE_URL checks.
Update the affected package php8 to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server 15 SP4 LTSS: 15-SP4
SUSE Linux Enterprise High Performance Computing LTSS 15: SP4
SUSE Linux Enterprise High Performance Computing ESPOS 15: SP4
Web and Scripting Module: 15-SP5
SUSE Linux Enterprise Server for SAP Applications 15: SP4 - SP5
SUSE Linux Enterprise Server 15: SP4 - SP5
SUSE Linux Enterprise High Performance Computing 15: SP4 - SP5
openSUSE Leap: 15.4 - 15.5
SUSE Manager Server: 4.3
php8-ftp: before 8.0.30-150400.4.43.1
php8-embed-debugsource: before 8.0.30-150400.4.43.1
php8-phar-debuginfo: before 8.0.30-150400.4.43.1
php8-sodium-debuginfo: before 8.0.30-150400.4.43.1
apache2-mod_php8-debugsource: before 8.0.30-150400.4.43.1
php8-sysvshm-debuginfo: before 8.0.30-150400.4.43.1
php8-pgsql: before 8.0.30-150400.4.43.1
php8-gettext: before 8.0.30-150400.4.43.1
php8-opcache-debuginfo: before 8.0.30-150400.4.43.1
php8-bz2: before 8.0.30-150400.4.43.1
php8-odbc: before 8.0.30-150400.4.43.1
php8-intl: before 8.0.30-150400.4.43.1
php8-bcmath-debuginfo: before 8.0.30-150400.4.43.1
php8-xsl: before 8.0.30-150400.4.43.1
php8-sockets-debuginfo: before 8.0.30-150400.4.43.1
php8-shmop: before 8.0.30-150400.4.43.1
php8-fastcgi-debugsource: before 8.0.30-150400.4.43.1
php8-tokenizer-debuginfo: before 8.0.30-150400.4.43.1
php8-fpm-debugsource: before 8.0.30-150400.4.43.1
php8-calendar-debuginfo: before 8.0.30-150400.4.43.1
php8-exif-debuginfo: before 8.0.30-150400.4.43.1
php8-fastcgi: before 8.0.30-150400.4.43.1
php8-posix-debuginfo: before 8.0.30-150400.4.43.1
php8-sysvsem: before 8.0.30-150400.4.43.1
php8-dom-debuginfo: before 8.0.30-150400.4.43.1
php8-cli: before 8.0.30-150400.4.43.1
php8-readline: before 8.0.30-150400.4.43.1
php8-fpm: before 8.0.30-150400.4.43.1
php8-sqlite: before 8.0.30-150400.4.43.1
php8-gmp: before 8.0.30-150400.4.43.1
php8-xmlreader-debuginfo: before 8.0.30-150400.4.43.1
php8-bcmath: before 8.0.30-150400.4.43.1
php8-snmp-debuginfo: before 8.0.30-150400.4.43.1
php8-phar: before 8.0.30-150400.4.43.1
php8-odbc-debuginfo: before 8.0.30-150400.4.43.1
php8-tidy-debuginfo: before 8.0.30-150400.4.43.1
php8-snmp: before 8.0.30-150400.4.43.1
php8-mbstring-debuginfo: before 8.0.30-150400.4.43.1
php8-enchant-debuginfo: before 8.0.30-150400.4.43.1
php8-shmop-debuginfo: before 8.0.30-150400.4.43.1
php8-sysvmsg-debuginfo: before 8.0.30-150400.4.43.1
php8-iconv: before 8.0.30-150400.4.43.1
php8-test: before 8.0.30-150400.4.43.1
php8-bz2-debuginfo: before 8.0.30-150400.4.43.1
php8-fastcgi-debuginfo: before 8.0.30-150400.4.43.1
php8-sqlite-debuginfo: before 8.0.30-150400.4.43.1
php8-fpm-debuginfo: before 8.0.30-150400.4.43.1
php8-enchant: before 8.0.30-150400.4.43.1
php8-dba: before 8.0.30-150400.4.43.1
apache2-mod_php8: before 8.0.30-150400.4.43.1
php8-gd-debuginfo: before 8.0.30-150400.4.43.1
php8-zip-debuginfo: before 8.0.30-150400.4.43.1
php8-ldap-debuginfo: before 8.0.30-150400.4.43.1
php8-devel: before 8.0.30-150400.4.43.1
php8-readline-debuginfo: before 8.0.30-150400.4.43.1
php8-mysql: before 8.0.30-150400.4.43.1
php8-gmp-debuginfo: before 8.0.30-150400.4.43.1
php8-soap-debuginfo: before 8.0.30-150400.4.43.1
php8-mysql-debuginfo: before 8.0.30-150400.4.43.1
php8-pgsql-debuginfo: before 8.0.30-150400.4.43.1
php8-xmlwriter-debuginfo: before 8.0.30-150400.4.43.1
php8-intl-debuginfo: before 8.0.30-150400.4.43.1
php8-sodium: before 8.0.30-150400.4.43.1
php8-embed: before 8.0.30-150400.4.43.1
php8-exif: before 8.0.30-150400.4.43.1
php8-fileinfo-debuginfo: before 8.0.30-150400.4.43.1
php8-soap: before 8.0.30-150400.4.43.1
php8-iconv-debuginfo: before 8.0.30-150400.4.43.1
php8-ftp-debuginfo: before 8.0.30-150400.4.43.1
php8-zip: before 8.0.30-150400.4.43.1
php8-zlib-debuginfo: before 8.0.30-150400.4.43.1
php8-pcntl: before 8.0.30-150400.4.43.1
php8-sysvshm: before 8.0.30-150400.4.43.1
php8-calendar: before 8.0.30-150400.4.43.1
php8: before 8.0.30-150400.4.43.1
php8-pcntl-debuginfo: before 8.0.30-150400.4.43.1
php8-tokenizer: before 8.0.30-150400.4.43.1
php8-dba-debuginfo: before 8.0.30-150400.4.43.1
php8-sysvsem-debuginfo: before 8.0.30-150400.4.43.1
php8-opcache: before 8.0.30-150400.4.43.1
php8-mbstring: before 8.0.30-150400.4.43.1
php8-ctype-debuginfo: before 8.0.30-150400.4.43.1
php8-cli-debuginfo: before 8.0.30-150400.4.43.1
php8-fileinfo: before 8.0.30-150400.4.43.1
php8-debuginfo: before 8.0.30-150400.4.43.1
php8-posix: before 8.0.30-150400.4.43.1
php8-curl: before 8.0.30-150400.4.43.1
php8-sockets: before 8.0.30-150400.4.43.1
php8-openssl-debuginfo: before 8.0.30-150400.4.43.1
php8-pdo: before 8.0.30-150400.4.43.1
php8-curl-debuginfo: before 8.0.30-150400.4.43.1
php8-xmlreader: before 8.0.30-150400.4.43.1
php8-dom: before 8.0.30-150400.4.43.1
php8-tidy: before 8.0.30-150400.4.43.1
php8-gettext-debuginfo: before 8.0.30-150400.4.43.1
php8-ctype: before 8.0.30-150400.4.43.1
apache2-mod_php8-debuginfo: before 8.0.30-150400.4.43.1
php8-debugsource: before 8.0.30-150400.4.43.1
php8-ldap: before 8.0.30-150400.4.43.1
php8-zlib: before 8.0.30-150400.4.43.1
php8-embed-debuginfo: before 8.0.30-150400.4.43.1
php8-pdo-debuginfo: before 8.0.30-150400.4.43.1
php8-xsl-debuginfo: before 8.0.30-150400.4.43.1
php8-gd: before 8.0.30-150400.4.43.1
php8-openssl: before 8.0.30-150400.4.43.1
php8-xmlwriter: before 8.0.30-150400.4.43.1
php8-sysvmsg: before 8.0.30-150400.4.43.1
External linkshttp://www.suse.com/support/update/announcement/2024/suse-su-20242039-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.