PT-2023-5269 · Php +10 · Php +10
Niels Dossche
+3
·
Published
2023-06-07
·
Updated
2025-08-11
·
CVE-2023-3247
4.3
Medium
Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N |
Name of the Vulnerable Software and Affected Versions:
PHP versions 8.0.* through 8.0.28
PHP versions 8.1.* through 8.1.19
PHP versions 8.2.* through 8.2.6
Description:
The issue is related to the use of a random value generator with a narrower range of values than it should have when using SOAP HTTP Digest Authentication. In case of random generator failure, it could lead to a disclosure of 31 bits of uninitialized memory from the client to the server, and it also made easier to a malicious server to guess the client's nonce.
Recommendations:
For PHP versions 8.0.* through 8.0.28, update to version 8.0.29 or later.
For PHP versions 8.1.* through 8.1.19, update to version 8.1.20 or later.
For PHP versions 8.2.* through 8.2.6, update to version 8.2.7 or later.
As a temporary workaround, consider disabling the SOAP HTTP Digest Authentication until a patch is available.
Exploit
Fix
Use of Insufficiently Random Values
Unchecked Return Value
Related Identifiers
Affected Products
References · 196
- 🔥❌ https://github.com/NewLockBit/CVE-2023-3824-PHP-to-RCE-LockBit-LEAK · Exploit, Deleted
- https://github.com/php/php-src/security/advisories/GHSA-76gg-c692-v2mw⭐ 39342 🔗 7925 · Vendor Advisory
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3096 · Security Note
- https://bdu.fstec.ru/vul/2023-06656 · Security Note
- https://bdu.fstec.ru/vul/2024-07679 · Security Note
- https://security-tracker.debian.org/tracker/source-package/php8.2 · Vendor Advisory
- https://osv.dev/vulnerability/SUSE-SU-2023:2980-1 · Vendor Advisory
- https://advisories.mageia.org/MGASA-2023-0234.html · Security Note
- https://osv.dev/vulnerability/OESA-2023-1621 · Vendor Advisory
- https://osv.dev/vulnerability/ALSA-2024:10952 · Vendor Advisory
- https://osv.dev/vulnerability/USN-6199-1 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2023-4118 · Vendor Advisory
- https://errata.altlinux.org/ALT-PU-2023-7021 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2023-0568 · Security Note
- http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-3247 · Security Note