Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-10141

Опубликовано: 23 июл. 2025
Источник: redhat
CVSS3: 5.6
EPSS Высокий

Описание

An unauthenticated OS command injection vulnerability exists within Xdebug versions 2.5.5 and earlier, a PHP debugging extension developed by Derick Rethans. When remote debugging is enabled, Xdebug listens on port 9000 and accepts debugger protocol commands without authentication. An attacker can send a crafted eval command over this interface to execute arbitrary PHP code, which may invoke system-level functions such as system() or passthru(). This results in full compromise of the host under the privileges of the web server user.

A code injection flaw was found in Xdebug. When a user enables remote debugging, Xdebug does not require authentication and will accept input from any user who can access the debug port. Enabling remote debugging is not recommended for normal use, but if exploited, this flaw would allow a remote attacker to execute code in the context of the Xdebug process.

Отчет

All Red Hat offerings use fixed versions of the Xdebug package (used for remote debugging) and are therefore not affected. Exploitation would require xdebug to be installed, enabled, and exposed to attackers which is a unlikely configuration in production environments. No Red Hat offerings enable it by default, reducing the severity to Moderate.

Меры по смягчению последствий

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 10php-pecl-xdebug3Not affected
Red Hat Enterprise Linux 8php:7.4/php-pecl-xdebugNot affected
Red Hat Enterprise Linux 8php:8.2/php-pecl-xdebug3Not affected
Red Hat Enterprise Linux 9php:8.2/php-pecl-xdebug3Not affected
Red Hat Enterprise Linux 9php:8.3/php-pecl-xdebug3Not affected
Red Hat Enterprise Linux 9php-pecl-xdebug3Not affected
Red Hat OpenShift Dev Spacesdevspaces/udi-rhel8Not affected
Red Hat OpenShift Dev Spacesdevspaces/udi-rhel9Not affected

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-306
Дефект:
CWE-78
https://bugzilla.redhat.com/show_bug.cgi?id=2383008xdebug: Xdebug Remote Debugger Command Execution

EPSS

Процентиль: 99%
0.74887
Высокий

5.6 Medium

CVSS3

Связанные уязвимости

ubuntu
4 месяца назад

An unauthenticated OS command injection vulnerability exists within Xdebug versions 2.5.5 and earlier, a PHP debugging extension developed by Derick Rethans. When remote debugging is enabled, Xdebug listens on port 9000 and accepts debugger protocol commands without authentication. An attacker can send a crafted eval command over this interface to execute arbitrary PHP code, which may invoke system-level functions such as system() or passthru(). This results in full compromise of the host under the privileges of the web server user.

nvd
4 месяца назад

An unauthenticated OS command injection vulnerability exists within Xdebug versions 2.5.5 and earlier, a PHP debugging extension developed by Derick Rethans. When remote debugging is enabled, Xdebug listens on port 9000 and accepts debugger protocol commands without authentication. An attacker can send a crafted eval command over this interface to execute arbitrary PHP code, which may invoke system-level functions such as system() or passthru(). This results in full compromise of the host under the privileges of the web server user.

debian
4 месяца назад

An unauthenticated OS command injection vulnerability exists within Xd ...

github
4 месяца назад

An unauthenticated OS command injection vulnerability exists within Xdebug versions 2.5.5 and earlier, a PHP debugging extension developed by Derick Rethans. When remote debugging is enabled, Xdebug listens on port 9000 and accepts debugger protocol commands without authentication. An attacker can send a crafted eval command over this interface to execute arbitrary PHP code, which may invoke system-level functions such as system() or passthru(). This results in full compromise of the host under the privileges of the web server user.

EPSS

Процентиль: 99%
0.74887
Высокий

5.6 Medium

CVSS3

Уязвимость CVE-2015-10141