Lucene search

K
hackeroneRyatH1:805010
HistoryFeb 26, 2020 - 5:04 a.m.

Internet Bug Bounty: PHP link() silently truncates after a null byte on Windows

2020-02-2605:04:15
ryat
hackerone.com
37

0.002 Low

EPSS

Percentile

54.8%

The bug submitted at: https://bugs.php.net/bug.php?id=78862
The security advisory at: https://nvd.nist.gov/vuln/detail/CVE-2019-11044

The issue allow remote attackers to read or write arbitrary files via crafted input to an application that calls the vulnerable function. As demonstrated by a file\0.ext attack that bypasses an intended configuration in which users may read or write only files.

Impact

In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.