Описание
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
Ссылки
- Third Party Advisory
- ExploitTechnical DescriptionThird Party Advisory
- Third Party AdvisoryVDB Entry
- Issue TrackingPermissions Required
- Technical Description
- Third Party Advisory
- ExploitTechnical DescriptionThird Party Advisory
- Third Party AdvisoryVDB Entry
- Issue TrackingPermissions Required
- Technical Description
Уязвимые конфигурации
Одно из
EPSS
9.8 Critical
CVSS3
7.5 High
CVSS2
Дефекты
Связанные уязвимости
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
In all versions of PHP 7, during the unserialization process, resizing ...
In all versions of PHP 7, during the unserialization process, resizing the 'properties' hash table of a serialized object may lead to use-after-free. A remote attacker may exploit this bug to gain arbitrary code execution.
Уязвимость интерпретатора PHP, позволяющая нарушителю выполнить произвольный код
EPSS
9.8 Critical
CVSS3
7.5 High
CVSS2