中危 phpXXE漏洞(CVE-2023-3823)

CVE编号

CVE-2023-3823

利用情况

暂无

补丁情况

官方补丁

披露时间

2023-07-21
漏洞描述
In PHP versions 8.0.* before 8.0.30, 8.1.* before 8.1.22, and 8.2.* before 8.2.8 various XML functions rely on libxml global state to track configuration variables, like whether external entities are loaded. This state is assumed to be unchanged unless the user explicitly changes it by calling appropriate function. However, since the state is process-global, other modules - such as ImageMagick - may also use this library within the same process, and change that global state for their internal purposes, and leave it in a state where external entities loading is enabled. This can lead to the situation where external XML is parsed with external entities loaded, which can lead to disclosure of any local files accessible to PHP. This vulnerable state may persist in the same process across many requests, until the process is shut down.


解决建议
"将组件 php 升级至 8.0.30 及以上版本"
"将组件 php 升级至 8.2.8 及以上版本"
"将组件 php 升级至 8.1.22 及以上版本"
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 php php * From
(including)
8.0.0
Up to
(excluding)
8.0.30
运行在以下环境
应用 php php * From
(including)
8.1.0
Up to
(excluding)
8.1.22
运行在以下环境
应用 php php * From
(including)
8.2.0
Up to
(excluding)
8.2.8
运行在以下环境
系统 alma_linux_9 php * Up to
(excluding)
8.0.30-1.el9_2
运行在以下环境
系统 alpine_3.16 php8 * Up to
(excluding)
8.1.22-r0
运行在以下环境
系统 alpine_3.17 php81 * Up to
(excluding)
8.1.22-r0
运行在以下环境
系统 amazon_2 php * Up to
(excluding)
8.2.9-1.amzn2
运行在以下环境
系统 amazon_2023 php8.1 * Up to
(excluding)
8.1.22-1.amzn2023.0.1
运行在以下环境
系统 anolis_os_23 php * Up to
(excluding)
8.2.10-1
运行在以下环境
系统 debian_10 php7.3 * Up to
(excluding)
7.3.31-1~deb10u5
运行在以下环境
系统 fedora_37 php * Up to
(excluding)
8.1.22-1.fc37
运行在以下环境
系统 fedora_38 php * Up to
(excluding)
8.2.9-1.fc38
运行在以下环境
系统 kylinos_aarch64_V10 php * Up to
(excluding)
7.2.34-3.ky10
运行在以下环境
系统 kylinos_aarch64_V10HPC php * Up to
(excluding)
8.0.30-1.ky10h
运行在以下环境
系统 kylinos_aarch64_V10SP1 php * Up to
(excluding)
7.2.34-3.p01.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP2 php * Up to
(excluding)
7.2.34-3.ky10
运行在以下环境
系统 kylinos_aarch64_V10SP3 php * Up to
(excluding)
7.2.34-3.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP1 php * Up to
(excluding)
7.2.34-3.p01.a.ky10
运行在以下环境
系统 kylinos_loongarch64_V10SP3 php * Up to
(excluding)
7.2.34-3.p02.a.ky10
运行在以下环境
系统 kylinos_x86_64_V10 php * Up to
(excluding)
7.2.34-3.ky10
运行在以下环境
系统 kylinos_x86_64_V10HPC php * Up to
(excluding)
8.0.30-1.ky10h
运行在以下环境
系统 kylinos_x86_64_V10SP1 php * Up to
(excluding)
7.2.34-3.p01.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP2 php * Up to
(excluding)
7.2.34-3.ky10
运行在以下环境
系统 kylinos_x86_64_V10SP3 php * Up to
(excluding)
7.2.34-3.ky10
运行在以下环境
系统 opensuse_Leap_15.4 php8 * Up to
(excluding)
8.0.30-150400.4.37.1
运行在以下环境
系统 opensuse_Leap_15.5 php8 * Up to
(excluding)
8.0.30-150400.4.37.1
运行在以下环境
系统 oracle_9 php * Up to
(excluding)
8.0.30-1.el9_2
运行在以下环境
系统 redhat_9 php * Up to
(excluding)
8.0.30-1.el9_2
运行在以下环境
系统 rocky_linux_9 php * Up to
(excluding)
8.0.30-1.el9_2
运行在以下环境
系统 ubuntu_22.04 php8.1 * Up to
(excluding)
8.1.2-1ubuntu2.14
阿里云评分
6.2
  • 攻击路径
    本地
  • 攻击复杂度
    复杂
  • 权限要求
    普通权限
  • 影响范围
    越权影响
  • EXP成熟度
    未验证
  • 补丁情况
    官方补丁
  • 数据保密性
    无影响
  • 数据完整性
    无影响
  • 服务器危害
    无影响
  • 全网数量
    N/A
CWE-ID 漏洞类型
CWE-611 XML外部实体引用的不恰当限制(XXE)
阿里云安全产品覆盖情况