Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2022-31625


In PHP versions 7.4.x below 7.4.30, 8.0.x below 8.0.20, and 8.1.x below 8.1.7, when using Postgres database extension, supplying invalid parameters to the parametrized query may lead to PHP attempting to free memory using uninitialized data as pointers. This could lead to RCE vulnerability or denial of service.


Published

2022-06-16T06:15:08.623

Last Modified

2024-11-21T07:04:52.873

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 8.1 (HIGH)

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

  • Access Vector: NETWORK
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: PARTIAL
Exploitability Score

8.6

Impact Score

6.4

Weaknesses
  • Type: Secondary
    CWE-590
    CWE-824
  • Type: Primary
    CWE-763

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application php php < 7.4.30 Yes
Application php php < 8.0.20 Yes
Application php php < 8.1.7 Yes
Operating System debian debian_linux 10.0 Yes
Operating System debian debian_linux 11.0 Yes

References