CVE-2023-3824

CRITICAL EXPLOITED RANSOMWARE

PHP <8.0.30-8.2.8 - Buffer Overflow

Title source: llm

Description

In PHP version 8.0.* before 8.0.30,  8.1.* before 8.1.22, and 8.2.* before 8.2.8, when loading phar file, while reading PHAR directory entries, insufficient length checking may lead to a stack buffer overflow, leading potentially to memory corruption or RCE.

Exploits (4)

nomisec WORKING POC 3 stars
by jhonnybonny · poc
https://github.com/jhonnybonny/CVE-2023-3824
nomisec WORKING POC
by dadosneurais · poc
https://github.com/dadosneurais/cve-2023-3824
nomisec SUSPICIOUS
by bluefish3r · poc
https://github.com/bluefish3r/poc-cve

Scores

CVSS v3 9.4
EPSS 0.3237
EPSS Percentile 96.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:L

Details

VulnCheck KEV 2024-05-06
Ransomware Use Confirmed
CWE
CWE-119
Status published
Products (3)
debian/debian_linux 10.0
fedoraproject/fedora 38
php/php 8.0.0 - 8.0.30
Published Aug 11, 2023
Tracked Since Feb 18, 2026