Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-4025

Опубликовано: 10 апр. 2015
Источник: redhat
CVSS2: 4
EPSS Низкий

Описание

PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpNot affected
Red Hat Enterprise Linux 5php53Not affected
Red Hat Enterprise Linux 6phpNot affected
Red Hat Enterprise Linux 7phpFixedRHSA-2015:113523.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6php55-phpFixedRHSA-2015:118625.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-php56-phpFixedRHSA-2015:118725.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6php54-phpFixedRHSA-2015:121909.07.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUSphp55-phpFixedRHSA-2015:118625.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUSrh-php56-phpFixedRHSA-2015:118725.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUSphp54-phpFixedRHSA-2015:121909.07.2015

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-626

EPSS

Процентиль: 92%
0.08516
Низкий

4 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

nvd
около 10 лет назад

PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

debian
около 10 лет назад

PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncat ...

github
около 3 лет назад

PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character in certain situations, which allows remote attackers to bypass intended extension restrictions and access files or directories with unexpected names via a crafted argument to (1) set_include_path, (2) tempnam, (3) rmdir, or (4) readlink. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

CVSS3: 6.5
fstec
около 10 лет назад

Уязвимость интерпретатора языка программирования PHP, связана с ошибкой при обработке при обработке путей к файлам с символом \x00, позволяющая нарушителю получить несанкционированный доступ к файлам или каталогам

EPSS

Процентиль: 92%
0.08516
Низкий

4 Medium

CVSS2