CVE-2018-19246
Description
PHP-Proxy 5.1.0 allows remote attackers to read local files if the default "pre-installed version" (intended for users who lack shell access to their web server) is used. This occurs because the aeb067ca0aa9a3193dce3a7264c90187 app_key value from the default config.php is in place, and this value can be easily used to calculate the authorization data needed for local file inclusion.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
PHP-Proxy 5.1.0 default pre-installed version uses a hardcoded app_key allowing remote attackers to read arbitrary local files via encrypted URL parameter.
Vulnerability
PHP-Proxy 5.1.0, specifically the default "pre-installed version" intended for users without shell access, contains a hardcoded app_key value (aeb067ca0aa9a3193dce3a7264c90187) in config.php [1][3]. This key is used to derive an encryption key via MD5 of app_key concatenated with the visitor's IP address, enabling the application to encrypt URLs. Attackers can exploit this default key to craft encrypted payloads that trigger local file inclusion [4].
Exploitation
An attacker needs only the ability to make HTTP requests to the PHP-Proxy instance. Knowing the default app_key and their own IP address as seen by the server (which can be determined from a prior request), they can generate an encrypted URL using the str_rot_pass and base64_url_encode functions [3][4]. The attacker then sends a request to index.php?q=<encrypted_string>, where the encrypted string contains a file:// URI targeting a local file [3][4]. No authentication or special privileges are required [1].
Impact
Successful exploitation allows an attacker to read arbitrary local files on the web server, including sensitive data such as passwords or configuration files [1][4]. This results in a complete compromise of confidentiality, potentially leading to further attacks if credentials are exposed [3].
Mitigation
Users should change the default app_key in config.php to a unique, strong value and ensure the encryption key is not derived solely from the IP address [2][3]. Upgrade to a patched version if available; the issue was addressed in a pull request on GitHub [2], but no official patched release date is specified [1]. As a workaround, avoid using the default pre-installed version and manually secure the configuration [3].
AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
athlon1600/php-proxyPackagist | <= 5.1.0 | — |
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- www.exploit-db.com/exploits/45861/mitreexploitx_refsource_EXPLOIT-DB
- github.com/advisories/GHSA-pc5h-m95g-v6rhghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2018-19246ghsaADVISORY
- github.com/Athlon1600/php-proxy-app/issues/134ghsax_refsource_MISCWEB
- github.com/Athlon1600/php-proxy/pull/126ghsaWEB
- www.exploit-db.com/exploits/45861ghsaWEB
News mentions
0No linked articles in our index yet.