The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 02:30
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2015-06/msg00028.html - | |
References | () http://openwall.com/lists/oss-security/2015/06/01/4 - Exploit | |
References | () http://php.net/ChangeLog-5.php - Patch | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1053.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1066.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1135.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2015-1218.html - | |
References | () http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html - | |
References | () http://www.securityfocus.com/bid/75103 - | |
References | () http://www.securitytracker.com/id/1032459 - | |
References | () https://bugs.php.net/bug.php?id=69085 - Exploit, Patch | |
References | () https://security.gentoo.org/glsa/201606-10 - | |
References | () https://support.apple.com/kb/HT205031 - |
Information
Published : 2015-06-09 18:59
Updated : 2024-11-21 02:30
NVD link : CVE-2015-4148
Mitre link : CVE-2015-4148
CVE.ORG link : CVE-2015-4148
JSON object : View
Products Affected
php
- php
apple
- mac_os_x
redhat
- enterprise_linux_server
- enterprise_linux_server_eus
- enterprise_linux_desktop
- enterprise_linux_hpc_node_eus
- enterprise_linux_hpc_node
- enterprise_linux_workstation
CWE
CWE-20
Improper Input Validation