Описание
The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a "type confusion" issue.
Релиз | Статус | Примечание |
---|---|---|
devel | released | 5.6.9+dfsg-1ubuntu1 |
esm-infra-legacy/trusty | not-affected | 5.5.9+dfsg-1ubuntu4.11 |
precise | released | 5.3.10-1ubuntu3.19 |
trusty | released | 5.5.9+dfsg-1ubuntu4.11 |
trusty/esm | not-affected | 5.5.9+dfsg-1ubuntu4.11 |
upstream | released | 5.4.39,5.5.23,5.6.7 |
utopic | released | 5.5.12+dfsg-2ubuntu4.6 |
vivid | released | 5.6.4+dfsg-4ubuntu6.2 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a "type confusion" issue.
The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a "type confusion" issue.
The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, ...
The SoapClient::__call method in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that __default_headers is an array, which allows remote attackers to execute arbitrary code by providing crafted serialized data with an unexpected data type, related to a "type confusion" issue.
Уязвимость метода soapclient::__call интерпретатора языка программирования PHP, позволяющая нарушителю выполнить произвольный код
EPSS
7.5 High
CVSS2