Lucene search

K
hackeroneHannoH1:477896
HistoryJan 11, 2019 - 10:10 a.m.

Internet Bug Bounty: Use after free and out of bounds read in xmlrpc_decode()

2019-01-1110:10:08
hanno
hackerone.com
$1500
44

0.004 Low

EPSS

Percentile

73.2%

Malformed input can lead to use after free and out of bounds memory errors.

This has been fixed with the latest updates of PHP (7.1.26/7.2.14/7.3.1).

(Note: I reported those as separate bugs to PHP, but they had the same underlying bug and were fixed by the same commit. The release notes only mention “out of bounds read”, but this is misleading, as a use after free error is potentially more severe.)

Bugs reported to PHP:
https://bugs.php.net/bug.php?id=77242
https://bugs.php.net/bug.php?id=77249

Impact

If the xmlrpc functionality of PHP is used to parse untrusted input from a public API point it can potentially be used to gain code execution.