In PHP Runtime for Apache OpenWhisk, a Docker action inheriting one of the Docker tags openwhisk/action-php-v7.2:1.0.0 or openwhisk/action-php-v7.1:1.0.1 (or earlier) may allow an attacker to replace the user function inside the container if the user code is vulnerable to code exploitation.
2018-07-23T17:29:00.243
2024-11-21T03:43:57.927
Modified
CVSSv3.0: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | apache | openwhisk | < 1.0.1 | Yes |
Application | php | php | 7.2.0 | No |
Application | apache | openwhisk | < 1.0.2 | Yes |
Application | php | php | 7.1.0 | No |