Lucene search

K
f5F5F5:K14433
HistorySep 17, 2013 - 12:00 a.m.

K14433 : PHP SOAP vulnerability CVE-2013-1643

2013-09-1700:00:00
my.f5.com
24

AI Score

6.6

Confidence

Low

EPSS

0.003

Percentile

69.2%

Security Advisory Description

PHP allows the use of external entities while parsing SOAP wsdl files, which allows an attacker to read arbitrary files. If a web application unserializes user-supplied data and tries to execute any method of it, an attacker can send a serialized SoapClient object initialized in non-wsdl mode, which will make PHP automatically parse the remote XML-document that is specified in the location option parameter. (
CVE-2013-1643
)
Impact
An attacker may be able to read arbitrary files on an affected system.