Vulnerability & Exploit Database

Displaying entries 1 - 10 of 23 in total

Results for: CVE-2013-1643 Back to search

USN-1761-1: PHP vulnerability Vulnerability

  • Severity: 5
  • Published: March 06, 2013

The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vuln...

SUSE Linux Security Vulnerability: CVE-2013-1643 Vulnerability

  • Severity: 5
  • Published: March 06, 2013

The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vuln...

PHP Vulnerability: CVE-2013-1643 Vulnerability

  • Severity: 5
  • Published: March 06, 2013

The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vuln...

Oracle Solaris 11: CVE-2013-1643: Vulnerability in PHP Vulnerability

  • Severity: 5
  • Published: March 06, 2013

The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vuln...

RHSA-2013:1615: php security, bug fix, and enhancement update Vulnerability

  • Severity: 5
  • Published: March 06, 2013

PHP is an HTML-embedded scripting language commonly used with the ApacheHTTP Server.It was found that PHP did not properly handle file names with a NULLcharacter. A remote attacker could possibly use this flaw to make a PHPscript access unexpected files and bypass intended file system accessrestrictions. (CVE-2006-7243)A flaw was found i...

ELSA-2013-1615 Moderate: Oracle Linux php security, bug fix, and enhancement update Vulnerability

  • Severity: 5
  • Published: March 06, 2013

The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vuln...

Gentoo Linux: CVE-2013-1643: PHP: Multiple vulnerabilities Vulnerability

  • Severity: 5
  • Published: March 06, 2013

The SOAP parser in PHP before 5.3.23 and 5.4.x before 5.4.13 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions. NOTE: this vuln...

FreeBSD: php5 -- Multiple vulnerabilities (Multiple CVEs) Vulnerability

  • Severity: 8
  • Published: March 06, 2013

ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.

DSA-2639-1 php5 -- several vulnerabilities Vulnerability

  • Severity: 8
  • Published: March 06, 2013

ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.