Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-5630

Опубликовано: 01 фев. 2017
Источник: debian
EPSS Низкий

Описание

PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5unfixedpackage
php-pearunfixedpackage

Примечания

  • https://pear.php.net/bugs/bug.php?id=21171

  • pear performs no kind of authentication/integrity checks for downloads, so an attacker can MITM freely anyway

EPSS

Процентиль: 91%
0.0754
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 8 лет назад

PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.

CVSS3: 3.4
redhat
больше 8 лет назад

PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.

CVSS3: 7.5
nvd
больше 8 лет назад

PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.

CVSS3: 7.5
github
около 3 лет назад

PEAR core file overwrite vulnerability

CVSS3: 7.5
fstec
больше 8 лет назад

Уязвимость библиотеки классов PHP PEAR, связанная с недостаточной нейтрализацией специальных элементов в запросе, позволяющая нарушителю оказать воздействие на целостность данных

EPSS

Процентиль: 91%
0.0754
Низкий