php unserialize vulnerability
1 TopicPHP 7 Unserialize Mechanism 0-days
Recently researchers at "Check Point" have uncovered 3 new previously unknown vulnerabilities in the new version of PHP. CVE-2016-7479 and CVE-2016-7480 could result in attackers taking a full control of the target server, while CVE-2016-7478 causes a Denial of Service condition resulting in server hang. Those vulnerabilities are related to triggering unwanted behaviour when PHP un-serializes objects. Such malicious objects might be sent to any PHP application as HTTP parameter, cookie or header values. Mitigation with Big-IP ASM BigIP-ASM customers are already protected against the new 0-days, while the attack will be detected and blocked by existing "Server Side Code Injection" signatures, specifically: "PHP object serialization injection attempt (Parameter)" (200004188) "PHP object serialization injection attempt (Header)" (200004189) "PHP object serialization injection attempt (URI)" (200004190) Following are examples of the blocked attack vectors related to those CVEs and the invoked attack signatures: Figure 1: Denial of Service attack vector (CVE-2016-7478) blocked with Attack Signature (200004188) Figure 2: CVE-2016-7479 proof of concept exploit Figure 3:CVE-2016-7479 POC exploit is being blocked with Attack Signature (200004188) Figure 4:CVE-2016-7479 "DateInterval" attack vector blocked with Attack Signature (200004188)479Views0likes0Comments