Описание
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
| Релиз | Статус | Примечание |
|---|---|---|
| devel | released | 5.6.11+dfsg-1ubuntu3 |
| esm-infra-legacy/trusty | released | 5.5.9+dfsg-1ubuntu4.13 |
| precise | released | 5.3.10-1ubuntu3.20 |
| trusty | released | 5.5.9+dfsg-1ubuntu4.13 |
| trusty/esm | released | 5.5.9+dfsg-1ubuntu4.13 |
| upstream | released | 5.5.29,5.6.13 |
| vivid | released | 5.6.4+dfsg-4ubuntu6.3 |
Показывать по
EPSS
7.5 High
CVSS2
7.3 High
CVSS3
Связанные уязвимости
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, ...
The SoapClient __call method in ext/soap/soap.c in PHP before 5.4.45, 5.5.x before 5.5.29, and 5.6.x before 5.6.13 does not properly manage headers, which allows remote attackers to execute arbitrary code via crafted serialized data that triggers a "type confusion" in the serialize_function_call function.
Уязвимость интерпретатора PHP, позволяющая нарушителю выполнить произвольный код
EPSS
7.5 High
CVSS2
7.3 High
CVSS3