Описание
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.
| Релиз | Статус | Примечание | 
|---|---|---|
| devel | DNE  | |
| esm-infra-legacy/trusty | ignored  | |
| lucid | ignored  | end of life | 
| precise | ignored  | |
| trusty | ignored  | |
| trusty/esm | ignored  | |
| upstream | needs-triage  | |
| utopic | ignored  | end of life | 
| vivid | ignored  | end of life | 
| vivid/stable-phone-overlay | DNE  | 
Показывать по
| Релиз | Статус | Примечание | 
|---|---|---|
| devel | ignored  | |
| esm-infra-legacy/trusty | DNE  | |
| esm-infra/xenial | ignored  | |
| precise | DNE  | |
| trusty | DNE  | |
| trusty/esm | DNE  | |
| upstream | needs-triage  | |
| vivid/stable-phone-overlay | DNE  | |
| vivid/ubuntu-core | DNE  | |
| wily | DNE  | 
Показывать по
EPSS
4.6 Medium
CVSS2
Связанные уязвимости
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.
The default soap.wsdl_cache_dir setting in (1) php.ini-production and ...
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.
Уязвимость функции get_sdl интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию, оказать воздействие на целостность данных или вызвать отказ в обслуживании
EPSS
4.6 Medium
CVSS2