vulnerability
Cent OS: CVE-2015-3411: CESA-2015:1218 (php)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:L/Au:N/C:P/I:P/A:N) | 2016-05-16 | 2016-12-01 | 2017-10-30 |
Severity
6
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:N)
Published
2016-05-16
Added
2016-12-01
Modified
2017-10-30
Description
PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.
Solution(s)
centos-upgrade-phpcentos-upgrade-php-bcmathcentos-upgrade-php-clicentos-upgrade-php-commoncentos-upgrade-php-dbacentos-upgrade-php-develcentos-upgrade-php-embeddedcentos-upgrade-php-enchantcentos-upgrade-php-fpmcentos-upgrade-php-gdcentos-upgrade-php-imapcentos-upgrade-php-intlcentos-upgrade-php-ldapcentos-upgrade-php-mbstringcentos-upgrade-php-mysqlcentos-upgrade-php-mysqlndcentos-upgrade-php-odbccentos-upgrade-php-pdocentos-upgrade-php-pgsqlcentos-upgrade-php-processcentos-upgrade-php-pspellcentos-upgrade-php-recodecentos-upgrade-php-snmpcentos-upgrade-php-soapcentos-upgrade-php-tidycentos-upgrade-php-xmlcentos-upgrade-php-xmlrpccentos-upgrade-php-zts

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.