The is_a function in PHP 5.3.7 and 5.3.8 triggers a call to the __autoload function, which makes it easier for remote attackers to execute arbitrary code by providing a crafted URL and leveraging potentially unsafe behavior in certain PEAR packages and custom autoloaders.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c03360041 - | |
References | () http://securityreason.com/securityalert/8525 - | |
References | () http://svn.php.net/viewvc/?view=revision&revision=317183 - Patch | |
References | () http://www.byte.nl/blog/2011/09/23/security-bug-in-is_a-function-in-php-5-3-7-5-3-8/ - Exploit | |
References | () http://www.securityfocus.com/archive/1/519770/30/0/threaded - | |
References | () https://bugs.php.net/bug.php?id=55475 - Exploit | |
References | () https://bugzilla.redhat.com/show_bug.cgi?id=741020 - Patch |
Information
Published : 2011-11-03 15:55
Updated : 2024-11-21 01:30
NVD link : CVE-2011-3379
Mitre link : CVE-2011-3379
CVE.ORG link : CVE-2011-3379
JSON object : View
Products Affected
php
- php
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')