CVE-2019-11043

8.7 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary code on PHP servers running vulnerable versions with specific FPM configurations. It affects PHP installations where the FPM module is enabled and configured in certain ways, potentially allowing attackers to write past allocated buffers and gain code execution.

💻 Affected Systems

Products:
  • PHP
Versions: PHP 7.1.x below 7.1.33, 7.2.x below 7.2.24, 7.3.x below 7.3.11
Operating Systems: All operating systems running affected PHP versions
Default Config Vulnerable: ✅ No
Notes: Requires specific FPM (FastCGI Process Manager) configurations; not all PHP installations are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full remote code execution leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Remote code execution allowing attackers to deploy malware, create backdoors, or exfiltrate sensitive data from web applications.

🟢

If Mitigated

Limited impact with proper network segmentation, WAF rules, and minimal exposed attack surface.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available and has been weaponized in real attacks. Exploitation requires specific URL patterns and FPM configurations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PHP 7.1.33, 7.2.24, 7.3.11 or later

Vendor Advisory: https://access.redhat.com/errata/RHSA-2019:3286

Restart Required: Yes

Instructions:

1. Update PHP to patched version using your package manager (apt-get upgrade php, yum update php, etc.) 2. Restart PHP-FPM service (systemctl restart php-fpm) 3. Restart web server (apache2/nginx) if applicable

🔧 Temporary Workarounds

Disable vulnerable FPM configurations

linux

Modify PHP-FPM configuration to remove vulnerable settings that enable the buffer overflow

Edit php-fpm.conf and ensure 'pm' settings are properly configured
Remove or secure any custom FPM configurations that trigger the vulnerability

Web Application Firewall rules

all

Block malicious requests that exploit the buffer overflow

Add WAF rule to block requests with patterns like /index.php?a=... that trigger the vulnerability

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vulnerable PHP servers from critical systems
  • Deploy web application firewall with specific rules to block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check PHP version with 'php -v' and verify if running affected version. Check FPM configuration files for vulnerable settings.

Check Version:

php -v | head -1

Verify Fix Applied:

After patching, run 'php -v' to confirm version is 7.1.33+, 7.2.24+, or 7.3.11+. Test with known exploit patterns to ensure they no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Unusual PHP-FPM process crashes
  • Requests with specific patterns like /index.php?a= followed by buffer overflow attempts
  • Error logs showing memory corruption in PHP-FPM

Network Indicators:

  • HTTP requests with crafted query strings targeting PHP files
  • Unusual traffic patterns to PHP-FPM ports (usually 9000)

SIEM Query:

source="php-fpm.log" AND ("segmentation fault" OR "buffer overflow" OR pattern matching exploit strings)

🔗 References

📤 Share & Export