Closed immanuelfodor closed 5 years ago
Thanks, will push a new image in a bit. :)
Wow, that was quick, thanks! Updated, but the PHP version seems to be the same:
docker-compose exec php-fpm-mailcow php -v
# PHP 7.3.10 (cli) (built: Oct 4 2019 23:31:43) ( NTS )
# Copyright (c) 1997-2018 The PHP Group
# Zend Engine v3.3.10, Copyright (c) 1998-2018 Zend Technologies
# with Zend OPcache v7.3.10, Copyright (c) 1999-2018, by Zend Technologies
I just checked there is no php 7.3.11 package for alpine 3.10 yet. https://pkgs.alpinelinux.org/packages?name=php7&branch=v3.10 . Thats probably why the base image is we use for phpfpm is not yet up to date.
It seems there is an open PR here: https://github.com/alpinelinux/aports/pull/11979
Okay I checked further the upstream image: https://hub.docker.com/_/php?tab=tags&page=1&name=7.3-fpm-alpine3.10
has been updated 35 minutes ago. With the new version. I think @andryyy has to rebuild once more :)
docker run --rm -it php:7.3-fpm-alpine3.10 php --version
PHP 7.3.11 (cli) (built: Oct 25 2019 03:29:07) ( NTS )
Copyright (c) 1997-2018 The PHP Group
Zend Engine v3.3.11, Copyright (c) 1998-2018 Zend Technologies
Just a remark: All the locations found by OPs search have a "try_files" clause which should protect against exploitation of this vulnerability. I think only the nextcloud could be affected. Updating the FPM is still a good idea anyways.
Will be pushed in a bit.
There is a new PHP/nginx vulnerability that might affect Mailcow as well as there are many
fastcgi_split_path_info
results in this repo for a quick search.PHP bugtracker: https://bugs.php.net/bug.php?id=78599 Exploit PoC: https://github.com/neex/phuip-fpizdam An example vulnerable docker-compose env: https://github.com/vulhub/vulhub/tree/master/php/CVE-2019-11043
The solution according to this article is:
After a fresh
./update.sh
the version is (@ Fri Oct 25 08:00:17 CEST 2019):This is how Nextcloud handles the issue: https://nextcloud.com/blog/urgent-security-issue-in-nginx-php-fpm/