CVE-2017-9841

Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:phpunit_project:phpunit:*:*:*:*:*:*:*:*
cpe:2.3:a:phpunit_project:phpunit:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2017-06-27 17:29

Updated : 2024-02-28 16:04


NVD link : CVE-2017-9841

Mitre link : CVE-2017-9841

CVE.ORG link : CVE-2017-9841


JSON object : View

Products Affected

phpunit_project

  • phpunit

oracle

  • communications_diameter_signaling_router
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')