7.2.29
7.3.16
7.4.4
CVE-2020-7064 describes an uninitialized memory read vulnerability within the PHP exifreaddata() function. This flaw allows a malicious actor to craft EXIF data that, when processed, can cause PHP to read one byte of uninitialized memory, potentially exposing sensitive information or leading to application crashes. The vulnerability impacts PHP versions 7.2.x prior to 7.2.9, 7.3.x prior to 7.3.16, and 7.4.x prior to 7.4.4. A fix is available in PHP 7.4.4.
An attacker could exploit this vulnerability by crafting a malicious image file containing specially crafted EXIF data. When this image is processed by a PHP application using exifreaddata(), the vulnerability is triggered, allowing the attacker to read a single byte of uninitialized memory. While the amount of data exposed is limited to a single byte, this could still reveal sensitive information such as parts of memory addresses, or other internal data structures. Repeated exploitation could potentially allow an attacker to map out larger portions of memory, leading to further information disclosure. The impact is particularly concerning in environments where PHP is used to process user-uploaded images, as this provides a direct attack vector.
CVE-2020-7064 was published on April 1, 2020. There are currently no publicly known active campaigns exploiting this vulnerability. No public Proof-of-Concept (POC) code has been widely released. The vulnerability's severity is rated as MEDIUM based on the CVSS score. It is not currently listed on CISA’s Known Exploited Vulnerabilities catalog (KEV).
Web applications using PHP versions 7.2.0–7.2.8, 7.3.0–7.3.15, and 7.4.0–7.4.3 are at risk. This includes websites, web services, and any application relying on PHP to process image data. Shared hosting environments are particularly vulnerable, as users may not have control over the PHP version running on the server.
• linux / server:
journalctl -u php7.4 | grep -i "uninitialized memory"• generic web:
curl -I http://your-php-application.com/image.jpg | grep -i "EXIF"• php: Check PHP version using php -v and ensure it's >= 7.4.4.
disclosure
Exploit-Status
EPSS
2.33% (85% Perzentil)
CVSS-Vektor
The primary mitigation for CVE-2020-7064 is to upgrade to PHP version 7.4.4 or later. If upgrading is not immediately feasible, consider implementing input validation to sanitize EXIF data before processing it with exifreaddata(). This could involve stripping potentially malicious EXIF tags or limiting the size of the EXIF data being processed. Web Application Firewalls (WAFs) can be configured to detect and block requests containing malicious EXIF data. After upgrading, confirm the fix by attempting to process a known malicious EXIF file and verifying that no uninitialized memory is read.
Actualice a la versión de PHP 7.2.29, 7.3.16 o 7.4.4 o superior. Esto corregirá la vulnerabilidad de lectura de memoria no inicializada en la función exif_read_data().
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2020-7064 is a medium severity vulnerability in PHP where malicious EXIF data can trigger an uninitialized memory read, potentially leading to information disclosure or crashes.
You are affected if you are using PHP versions 7.2.0–7.2.8, 7.3.0–7.3.15, or 7.4.0–7.4.3. Upgrade to a patched version to mitigate the risk.
Upgrade to PHP 7.4.4 or later. If immediate upgrade is not possible, implement input validation to sanitize EXIF data.
While no active exploitation campaigns have been definitively linked, the vulnerability's nature makes it a potential target for attackers.
Refer to the PHP security advisory: https://security.php.net/CVE-2020-7064
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.