Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-j2xj-f75j-96w3

Опубликовано: 14 мая 2022
Источник: github
Github: Не прошло ревью
CVSS3: 9.8

Описание

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

EPSS

Процентиль: 92%
0.07966
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 9.8
ubuntu
около 9 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 4.5
redhat
больше 9 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 9.8
nvd
около 9 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.

CVSS3: 9.8
debian
около 9 лет назад

The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x ...

fstec
около 9 лет назад

Уязвимость интерпретатора PHP и операционной системы Mac OS X, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 92%
0.07966
Низкий

9.8 Critical

CVSS3

Дефекты

CWE-20