CVE-2015-3411
16.05.2016, 10:59
PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.Enginsight
| Vendor | Product | Version |
|---|---|---|
| redhat | enterprise_linux | 6.0 |
| redhat | enterprise_linux | 7.0 |
| redhat | enterprise_linux_desktop | 7.0 |
| redhat | enterprise_linux_hpc_node | 7.0 |
| redhat | enterprise_linux_hpc_node_eus | 7.1 |
| redhat | enterprise_linux_server | 7.0 |
| redhat | enterprise_linux_server_eus | 7.1 |
| redhat | enterprise_linux_workstation | 7.0 |
| php | php | 𝑥 ≤ 5.4.39 |
| php | php | 5.5.0 |
| php | php | 5.5.1 |
| php | php | 5.5.2 |
| php | php | 5.5.3 |
| php | php | 5.5.4 |
| php | php | 5.5.5 |
| php | php | 5.5.6 |
| php | php | 5.5.7 |
| php | php | 5.5.8 |
| php | php | 5.5.9 |
| php | php | 5.5.10 |
| php | php | 5.5.11 |
| php | php | 5.5.12 |
| php | php | 5.5.13 |
| php | php | 5.5.14 |
| php | php | 5.5.15 |
| php | php | 5.5.16 |
| php | php | 5.5.17 |
| php | php | 5.5.18 |
| php | php | 5.5.19 |
| php | php | 5.5.20 |
| php | php | 5.5.21 |
| php | php | 5.5.22 |
| php | php | 5.5.23 |
| php | php | 5.6.0 |
| php | php | 5.6.1 |
| php | php | 5.6.2 |
| php | php | 5.6.3 |
| php | php | 5.6.4 |
| php | php | 5.6.5 |
| php | php | 5.6.6 |
| php | php | 5.6.7 |
𝑥
= Vulnerable software versions
Ubuntu Releases
Common Weakness Enumeration
References