Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-7125

Опубликовано: 12 сент. 2016
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.

РелизСтатусПримечание
devel

DNE

esm-infra-legacy/trusty

not-affected

5.5.9+dfsg-1ubuntu4.20
precise

released

5.3.10-1ubuntu3.25
trusty

released

5.5.9+dfsg-1ubuntu4.20
trusty/esm

not-affected

5.5.9+dfsg-1ubuntu4.20
upstream

released

5.6.25
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

DNE

Показывать по

РелизСтатусПримечание
devel

released

7.0.8-3ubuntu3
esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

7.0.8-0ubuntu0.16.04.3
precise

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

7.0.10
vivid/stable-phone-overlay

DNE

vivid/ubuntu-core

DNE

xenial

released

7.0.8-0ubuntu0.16.04.3

Показывать по

EPSS

Процентиль: 78%
0.0117
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 7.5
redhat
почти 9 лет назад

ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.

CVSS3: 7.5
nvd
почти 9 лет назад

ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.

CVSS3: 7.5
debian
почти 9 лет назад

ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips ...

CVSS3: 7.5
github
около 3 лет назад

ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.

CVSS3: 7.5
fstec
почти 9 лет назад

Уязвимость компонента ext/session/session.c интерпретатора языка программирования PHP, позволяющая нарушителю изменять данные сеанса пользователя

EPSS

Процентиль: 78%
0.0117
Низкий

5 Medium

CVSS2

7.5 High

CVSS3