Описание
ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
Ссылки
- Mailing List
- Release Notes
- Release Notes
- ExploitIssue Tracking
- Issue TrackingPatch
- Mailing List
- Release Notes
- Release Notes
- ExploitIssue Tracking
- Issue TrackingPatch
Уязвимые конфигурации
Одно из
EPSS
7.5 High
CVSS3
5 Medium
CVSS2
Дефекты
Связанные уязвимости
ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips ...
ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
Уязвимость компонента ext/session/session.c интерпретатора языка программирования PHP, позволяющая нарушителю изменять данные сеанса пользователя
EPSS
7.5 High
CVSS3
5 Medium
CVSS2