VYPR
High severityNVD Advisory· Published Nov 13, 2018· Updated Aug 5, 2024

CVE-2018-19246

CVE-2018-19246

Description

PHP-Proxy 5.1.0 allows remote attackers to read local files if the default "pre-installed version" (intended for users who lack shell access to their web server) is used. This occurs because the aeb067ca0aa9a3193dce3a7264c90187 app_key value from the default config.php is in place, and this value can be easily used to calculate the authorization data needed for local file inclusion.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

PHP-Proxy 5.1.0 default pre-installed version uses a hardcoded app_key allowing remote attackers to read arbitrary local files via encrypted URL parameter.

Vulnerability

PHP-Proxy 5.1.0, specifically the default "pre-installed version" intended for users without shell access, contains a hardcoded app_key value (aeb067ca0aa9a3193dce3a7264c90187) in config.php [1][3]. This key is used to derive an encryption key via MD5 of app_key concatenated with the visitor's IP address, enabling the application to encrypt URLs. Attackers can exploit this default key to craft encrypted payloads that trigger local file inclusion [4].

Exploitation

An attacker needs only the ability to make HTTP requests to the PHP-Proxy instance. Knowing the default app_key and their own IP address as seen by the server (which can be determined from a prior request), they can generate an encrypted URL using the str_rot_pass and base64_url_encode functions [3][4]. The attacker then sends a request to index.php?q=<encrypted_string>, where the encrypted string contains a file:// URI targeting a local file [3][4]. No authentication or special privileges are required [1].

Impact

Successful exploitation allows an attacker to read arbitrary local files on the web server, including sensitive data such as passwords or configuration files [1][4]. This results in a complete compromise of confidentiality, potentially leading to further attacks if credentials are exposed [3].

Mitigation

Users should change the default app_key in config.php to a unique, strong value and ensure the encryption key is not derived solely from the IP address [2][3]. Upgrade to a patched version if available; the issue was addressed in a pull request on GitHub [2], but no official patched release date is specified [1]. As a workaround, avoid using the default pre-installed version and manually secure the configuration [3].

AI Insight generated on May 22, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
athlon1600/php-proxyPackagist
<= 5.1.0

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

6

News mentions

0

No linked articles in our index yet.