Description
HHVM supports the use of an "admin" server which accepts administrative requests over HTTP. One of those request handlers, dump-pcre-cache, can be used to output cached regular expressions from the current execution context into a file. The handler takes a parameter which specifies where on the filesystem to write this data. The parameter is not validated, allowing a malicious user to overwrite arbitrary files where the user running HHVM has write access. This issue affects HHVM versions prior to 4.56.2, all versions between 4.57.0 and 4.78.0, as well as 4.79.0, 4.80.0, 4.81.0, 4.82.0, and 4.83.0.
References (3)
Core 3
Core References
Vendor Advisory x_refsource_confirm
https://hhvm.com/blog/2020/11/12/security-update.html
Patch, Third Party Advisory x_refsource_confirm
https://github.com/facebook/hhvm/commit/abe0b29e4d3a610f9bc920b8be4ad8403364c2d4
Broken Link x_refsource_confirm
https://www.facebook.com/security/advisories/cve-2019-3556
Scores
CVSS v3
8.1
EPSS
0.0167
EPSS Percentile
82.2%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Details
CWE
CWE-22
Status
published
Products (6)
facebook/hhvm
4.79.0
facebook/hhvm
4.80.0
facebook/hhvm
4.81.0
facebook/hhvm
4.82.0
facebook/hhvm
4.83.0
facebook/hhvm
< 4.56.2
Published
Oct 26, 2021
Tracked Since
Feb 18, 2026