Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2015-4026

Опубликовано: 14 мая 2015
Источник: redhat
CVSS2: 4
EPSS Средний

Описание

The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpWill not fix
Red Hat Enterprise Linux 5php53Will not fix
Red Hat Enterprise Linux 6phpFixedRHSA-2015:121809.07.2015
Red Hat Enterprise Linux 7phpFixedRHSA-2015:113523.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6php55-phpFixedRHSA-2015:118625.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6rh-php56-phpFixedRHSA-2015:118725.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6php54-phpFixedRHSA-2015:121909.07.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUSphp55-phpFixedRHSA-2015:118625.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUSrh-php56-phpFixedRHSA-2015:118725.06.2015
Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUSphp54-phpFixedRHSA-2015:121909.07.2015

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-626
https://bugzilla.redhat.com/show_bug.cgi?id=1223422php: pcntl_exec() accepts paths with NUL character

EPSS

Процентиль: 93%
0.10305
Средний

4 Medium

CVSS2

Связанные уязвимости

ubuntu
около 10 лет назад

The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

nvd
около 10 лет назад

The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

debian
около 10 лет назад

The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.2 ...

github
около 3 лет назад

The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.

CVSS3: 6.5
fstec
около 10 лет назад

Уязвимость реализация pcntl_exec интерпретатора языка программирования PHP, связанная с ошибкой при обработке при обработке путей к файлам с символом \x00, позволяющая нарушителю обойти существующие ограничения безопасности и выполнить произвольный код

EPSS

Процентиль: 93%
0.10305
Средний

4 Medium

CVSS2