Bref enable serverless PHP on AWS Lambda. When Bref is used with the Event-Driven Function runtime and the handler is a `RequestHandlerInterface`, then the Lambda event is converted to a PSR7 object. During the conversion process, if the request is a MultiPart, each part is parsed and for each which contains a file, it is extracted and saved in `/tmp` with a random filename starting with `bref_upload_`. The flow mimics what plain PHP does but it does not delete the temporary files when the request has been processed. An attacker could fill the Lambda instance disk by performing multiple MultiPart requests containing files. This vulnerability is patched in 2.1.13.
References
Link | Resource |
---|---|
https://github.com/brefphp/bref/commit/350788de12880b6fd64c4c318ba995388bec840e | Patch |
https://github.com/brefphp/bref/security/advisories/GHSA-x4hh-frx8-98r5 | Exploit Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-02-01T16:10:07.976Z
Updated: 2024-02-01T20:20:00.974Z
Reserved: 2024-01-29T20:51:26.009Z
Link: CVE-2024-24752
JSON object: View
NVD Information
Status : Analyzed
Published: 2024-02-01T16:17:14.487
Modified: 2024-02-09T01:45:17.263
Link: CVE-2024-24752
JSON object: View
Redhat Information
No data.
CWE