I'm trying to remove PHP vulnerability on my Centos7 machine that is being reported by rapid7 security scan. I've upgraded from PHP7.1 to PHP7.4 however after another scan, the php71 packages are still being reported.
I also ensured that 7.1 packages were removed by running commands;
yum remove -y php71
yum autoremove
rm -rf /var/cache/yum/x86_64/7/remi-php71*
I've attached a screenshot of the report
As remediation steps it's asking me to upgrade to the latest version of PHP but I've already done an upgrade.
Any ideas please?
This is probably not enough, you should remove everything in this SCL
Also check you have restart the needed services (httpd, nginx, php-fpm...)
Please also notice that such vuln scanner result have no value if it use upstream "version", when package may include security fix.
Ex from php 7.1.33-22 in my repository (all known security fix from 7.4.32 are also fixed in this package)
Of course, I recommend using a PHP upstream suported version.
I also recommend to upgrade to a more recent version of CentOS, as version is now 8 years old and close to its end of life.
Reminder: for proper repository installation and usage, follow the wizard instructions especially, if you want a single version, you don't have to install SCL designed for installation of multiple versions. And using a single version make upgrade simpler.