Описание
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
It was found that certain PHP functions did not properly handle file names containing a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 5 | php | Will not fix | ||
Red Hat Enterprise Linux 5 | php53 | Will not fix | ||
Red Hat Enterprise Linux 6 | php | Fixed | RHSA-2015:1218 | 09.07.2015 |
Red Hat Enterprise Linux 7 | php | Fixed | RHSA-2015:1135 | 23.06.2015 |
Red Hat Software Collections for Red Hat Enterprise Linux 6 | php55-php | Fixed | RHSA-2015:1186 | 25.06.2015 |
Red Hat Software Collections for Red Hat Enterprise Linux 6 | rh-php56-php | Fixed | RHSA-2015:1187 | 25.06.2015 |
Red Hat Software Collections for Red Hat Enterprise Linux 6 | php54-php | Fixed | RHSA-2015:1219 | 09.07.2015 |
Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUS | php55-php | Fixed | RHSA-2015:1186 | 25.06.2015 |
Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUS | rh-php56-php | Fixed | RHSA-2015:1187 | 25.06.2015 |
Red Hat Software Collections for Red Hat Enterprise Linux 6.5 EUS | php54-php | Fixed | RHSA-2015:1219 | 09.07.2015 |
Показывать по
Дополнительная информация
Статус:
EPSS
4 Medium
CVSS2
Связанные уязвимости
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.2 ...
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
Уязвимость реализация pcntl_exec интерпретатора языка программирования PHP, связанная с ошибкой при обработке при обработке путей к файлам с символом \x00, позволяющая нарушителю обойти существующие ограничения безопасности и выполнить произвольный код
EPSS
4 Medium
CVSS2