Lucene search

K
f5F5F5:K17313
HistoryOct 06, 2015 - 12:00 a.m.

K17313 : PHP vulnerability CVE-2014-4721

2015-10-0600:00:00
my.f5.com
39

8.9 High

AI Score

Confidence

High

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.007 Low

EPSS

Percentile

78.9%

Security Advisory Description

The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a “type confusion” vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php. (CVE-2014-4721)
Impact
This vulnerability may allow the unauthorized disclosure of information. However, while the vulnerable code exists in F5 systems, the relevant functions are not used by default. Additionally, any attack would need to be sourced locally from the shell, which means an attacker likely already has a granted role with the same permissions as a root user. This is a low risk item.

8.9 High

AI Score

Confidence

High

2.6 Low

CVSS2

Access Vector

NETWORK

Access Complexity

HIGH

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:H/Au:N/C:P/I:N/A:N

0.007 Low

EPSS

Percentile

78.9%