CVE-2024-8925

NameCVE-2024-8925
DescriptionIn PHP versions 8.1.* before 8.1.30, 8.2.* before 8.2.24, 8.3.* before 8.3.12, erroneous parsing of multipart form data contained in an HTTP POST request could lead to legitimate data not being processed. This could lead to malicious attacker able to control part of the submitted data being able to exclude portion of other data, potentially leading to erroneous application behavior.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3920-1, DSA-5780-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php7.4 (PTS)bullseye7.4.33-1+deb11u5vulnerable
bullseye (security)7.4.33-1+deb11u6fixed
php8.2 (PTS)bookworm, bookworm (security)8.2.24-1~deb12u1fixed
sid, trixie8.2.24-1fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php7.4sourcebullseye7.4.33-1+deb11u6DLA-3920-1
php7.4source(unstable)(unfixed)
php8.2sourcebookworm8.2.24-1~deb12u1DSA-5780-1
php8.2source(unstable)8.2.24-1

Notes

Fixed in 8.3.12, 8.2.24
https://github.com/php/php-src/security/advisories/GHSA-9pqp-7h25-4f32
https://github.com/php/php-src/commit/19b49258d0c5a61398d395d8afde1123e8d161e0 (PHP-8.2.24)

Search for package or bug name: Reporting problems