
Cloud Vulnerability DB
A community-led vulnerabilities database
CVE-2023-0568 affects PHP versions 8.0.X before 8.0.28, 8.1.X before 8.1.16 and 8.2.X before 8.2.3. The vulnerability exists in the core path resolution function where a buffer is allocated one byte too small. This issue was discovered on January 20, 2023 and was publicly disclosed on February 16, 2023 (PHP Bug, NVD).
The vulnerability stems from a buffer allocation issue in PHP's core path resolution function. When resolving paths with lengths close to the system MAXPATHLEN setting, the function allocates a buffer that is one byte too small. This can lead to the byte after the allocated buffer being overwritten with a NUL value. The vulnerability has been assigned a CVSS v3.1 base score of 8.1 (HIGH) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H (NetApp Advisory).
The successful exploitation of this vulnerability could lead to unauthorized data access or modification when processing paths with lengths close to the system's maximum path length limit. The overwritten byte after the allocated buffer could potentially affect memory integrity (NVD).
The vulnerability has been fixed in PHP versions 8.0.28, 8.1.16, and 8.2.3. Users are advised to upgrade to these or later versions to address the issue. The fix involves proper buffer allocation and validation of path lengths (PHP Bug).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."