Description
In PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, while processing PHAR files using phar extension, phar_parse_zipfile could be tricked into accessing freed memory, which could lead to a crash or information disclosure.
CVSS vector
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:LExploitability: 1.0 | Impact: 2.5Attack Vector: Local
Complexity: High
Privileges: Low
User Interaction: None
Scope: Unchanged
Confidentiality: Low
Integrity: None
Availability: Low
Affected Packages4 packages
▶Ubuntuphp5/php5< 5.5.9+dfsg-1ubuntu4.29+esm14 Also affects: Debian Linux 10.0
🔴Vulnerability Details
5GHSAGHSA-vc9g-5348-gqwv: In PHP versions 7↗2022-05-24 ▶ OSVphp5, php7.0 vulnerabilities↗2021-07-13 ▶ OSVphp7.2, php7.4 vulnerabilities↗2021-07-07 ▶ CVEListUse of freed hash key in the phar_parse_zipfile function↗2020-09-09 ▶ OSVCVE-2020-7068: In PHP versions 7↗2020-09-09 ▶ 📋Vendor Advisories
4UbuntuPHP vulnerabilities↗2021-07-13 ▶ UbuntuPHP vulnerabilities↗2021-07-07 ▶ Red Hatphp: Use of freed hash key in the phar_parse_zipfile function↗2020-08-06 ▶ DebianCVE-2020-7068: php7.4 - In PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, wh...↗2020 ▶ 💬Community
3HackerOneUse after free vulnerability in phar_parse_zipfile↗2020-11-09 ▶ BugzillaCVE-2020-7068 php: Use of freed hash key in the phar_parse_zipfile function↗2020-08-11 ▶ BugzillaCVE-2020-7068 php: Use of freed hash key in the phar_parse_zipfile function [fedora-all]↗2020-08-11 ▶