Apache VCL versions 2.1 through 2.5 do not properly validate form input when processing a submitted block allocation. The form data is then used as an argument to the php built in function strtotime. This allows for an attack against the underlying implementation of that function. The implementation of strtotime at the time the issue was discovered appeared to be resistant to a malicious attack. However, all VCL systems running versions earlier than 2.5.1 should be upgraded or patched. This vulnerability was found and reported to the Apache VCL project by ADLab of Venustech.
References
Link | Resource |
---|---|
https://lists.apache.org/thread.html/db71c4edc21ecb834cf20e3ee23ffac5d37f32e7eb67257a413bf878@%3Cdev.vcl.apache.org%3E | Mailing List Vendor Advisory |
https://lists.apache.org/thread.html/8f3284afbcb4b87ed107dac98603020c23a379c687858b41da763147@%3Cannounce.apache.org%3E | Mailing List Vendor Advisory |
Configurations
Information
Published : 2019-07-29 12:15
Updated : 2019-08-07 10:01
NVD link : CVE-2018-11773
Mitre link : CVE-2018-11773
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
apache
- virtual_computing_lab