CVE-2024-24754

Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and its content added in the `$files` or `$parsedBody` arrays. The conversion process produces a different output compared to the one of plain PHP when keys ending with and open square bracket ([) are used. Based on the application logic the difference in the body parsing might lead to vulnerabilities and/or undefined behaviors. This vulnerability is patched in 2.1.13.
Configurations

Configuration 1 (hide)

cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*

History

09 Feb 2024, 01:56

Type Values Removed Values Added
References () https://github.com/brefphp/bref/commit/c77d9f5abf021f29fa96b5720b7b84adbd199092 - () https://github.com/brefphp/bref/commit/c77d9f5abf021f29fa96b5720b7b84adbd199092 - Patch
References () https://github.com/brefphp/bref/security/advisories/GHSA-82vx-mm6r-gg8w - () https://github.com/brefphp/bref/security/advisories/GHSA-82vx-mm6r-gg8w - Exploit, Vendor Advisory
CVSS v2 : unknown
v3 : 3.7
v2 : unknown
v3 : 9.8
CPE cpe:2.3:a:mnapoli:bref:*:*:*:*:*:*:*:*
First Time Mnapoli
Mnapoli bref
Summary
  • (es) Bref habilita PHP sin servidor en AWS Lambda. Cuando se usa Bref con el tiempo de ejecución de la función controlada por eventos y el controlador es "RequestHandlerInterface", el evento Lambda se convierte en un objeto PSR7. Durante el proceso de conversión, si la solicitud es MultiPart, cada parte se analiza y su contenido se agrega en las matrices `$files` o `$parsedBody`. El proceso de conversión produce un resultado diferente en comparación con el de PHP simple cuando se utilizan claves que terminan en un corchete abierto ([). Según la lógica de la aplicación, la diferencia en el análisis del cuerpo podría generar vulnerabilidades y/o comportamientos indefinidos. Esta vulnerabilidad está parcheada en 2.1.13.

01 Feb 2024, 21:15

Type Values Removed Values Added
References
  • () https://github.com/brefphp/bref/commit/c77d9f5abf021f29fa96b5720b7b84adbd199092 -
Summary (en) Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and its content added in the `$files` or `$parsedBody` arrays. The conversion process produces a different output compared to the one of plain PHP when keys ending with and open square bracket ([) are used. Based on the application logic the difference in the body parsing might lead to vulnerabilities and/or undefined behaviors. This vulnerability is patched in 2.1.13. (en) Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and its content added in the `$files` or `$parsedBody` arrays. The conversion process produces a different output compared to the one of plain PHP when keys ending with and open square bracket ([) are used. Based on the application logic the difference in the body parsing might lead to vulnerabilities and/or undefined behaviors. This vulnerability is patched in 2.1.13.

01 Feb 2024, 16:17

Type Values Removed Values Added
New CVE

Information

Published : 2024-02-01 16:17

Updated : 2024-02-09 01:56


NVD link : CVE-2024-24754

Mitre link : CVE-2024-24754

CVE.ORG link : CVE-2024-24754


JSON object : View

Products Affected

mnapoli

  • bref
CWE
CWE-436

Interpretation Conflict