PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 02:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=4435b9142ff9813845d5c97ab29a5d637bedb257 - | |
References | () http://php.net/ChangeLog-5.php - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1135.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1186.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1187.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1218.html - | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - | |
References | () http://www.securityfocus.com/bid/75255 - | |
References | () http://www.securitytracker.com/id/1032709 - | |
References | () https://bugs.php.net/bug.php?id=69353 - Exploit |
07 Nov 2023, 02:25
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2016-05-16 10:59
Updated : 2024-11-21 02:29
NVD link : CVE-2015-3411
Mitre link : CVE-2015-3411
CVE.ORG link : CVE-2015-3411
JSON object : View
Products Affected
php
- php
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux
- enterprise_linux_desktop
- enterprise_linux_hpc_node_eus
- enterprise_linux_hpc_node
- enterprise_linux_workstation
CWE
CWE-20
Improper Input Validation