Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-4072

Опубликовано: 20 мая 2016
Источник: debian
EPSS Низкий

Описание

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php7.0fixed7.0.5-1package
php5fixed5.6.20+dfsg-1package

Примечания

  • Fixed in 7.0.5, 5.6.20, 5.5.34

  • https://bugs.php.net/bug.php?id=71860

  • https://gist.github.com/smalyshev/80b5c2909832872f2ba2

  • https://git.php.net/?p=php-src.git;a=commit;h=1e9b175204e3286d64dfd6c9f09151c31b5e099a

  • https://www.openwall.com/lists/oss-security/2016/04/11/7

EPSS

Процентиль: 92%
0.07966
Низкий

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 4.5
redhat
больше 9 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 9.8
nvd
около 9 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 9.8
github
около 3 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

fstec
около 9 лет назад

Уязвимость интерпретатора PHP и операционной системы Mac OS X, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 92%
0.07966
Низкий