Description
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
No analysis available yet.
Remediation
Vendor Workaround
Setting post_max_size to value significantly lower than the memory limit prevents this issue from being exploited. Disabling file uploads also prevents this issue from happening.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2261-1 | php5 security update |
Debian DSA |
DSA-4717-1 | php7.0 security update |
Debian DSA |
DSA-4719-1 | php7.3 security update |
EUVD |
EUVD-2019-2756 | In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server. |
Ubuntu USN |
USN-4375-1 | PHP vulnerability |
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: php
Published:
Updated: 2024-09-16T18:13:31.009Z
Reserved: 2019-04-09T00:00:00.000Z
Link: CVE-2019-11048
No data.
Status : Modified
Published: 2020-05-20T08:15:10.110
Modified: 2024-11-21T04:20:26.860
Link: CVE-2019-11048
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN