Lucene search

K
f5F5F5:K14433
HistorySep 17, 2013 - 12:00 a.m.

K14433 : PHP SOAP vulnerability CVE-2013-1643

2013-09-1700:00:00
my.f5.com
21

6.6 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

65.8%

Security Advisory Description

PHP allows the use of external entities while parsing SOAP wsdl files, which allows an attacker to read arbitrary files. If a web application unserializes user-supplied data and tries to execute any method of it, an attacker can send a serialized SoapClient object initialized in non-wsdl mode, which will make PHP automatically parse the remote XML-document that is specified in the location option parameter. (
CVE-2013-1643
)
Impact
An attacker may be able to read arbitrary files on an affected system.

6.6 Medium

AI Score

Confidence

Low

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.003 Low

EPSS

Percentile

65.8%