In PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, when using PHP-FPM SAPI and it is configured to catch workers output through catch_workers_output = yes, it may be possible to pollute the final log or remove up to 4 characters from the log messages by manipulating log message content. Additionally, if PHP-FPM is configured to use syslog output, it may be possible to further remove log data using the same vulnerability.
The product does not neutralize or incorrectly neutralizes output that is written to logs.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Php-fpm | Php-fpm | 8.1.0 (including) | 8.1.30 (excluding) |
Php-fpm | Php-fpm | 8.2.0 (including) | 8.2.24 (excluding) |
Php-fpm | Php-fpm | 8.3.0 (including) | 8.3.12 (excluding) |
Red Hat Enterprise Linux 8 | RedHat | php:8.2-8100020241112130045.f7998665 | * |
Red Hat Enterprise Linux 8 | RedHat | php:7.4-8100020241113075828.f7998665 | * |
Red Hat Enterprise Linux 9 | RedHat | php:8.2-9050020241112094217.9 | * |
Red Hat Enterprise Linux 9 | RedHat | php:8.1-9050020241112144108.9 | * |
Php8.1 | Ubuntu | jammy | * |
Php8.1 | Ubuntu | upstream | * |
Php8.3 | Ubuntu | devel | * |
Php8.3 | Ubuntu | noble | * |
Php8.3 | Ubuntu | upstream | * |
This can allow an attacker to forge log entries or inject malicious content into logs. Log forging vulnerabilities occur when: