CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
79.7%
PHP before 5.4.42, 5.5.x before 5.5.26, and 5.6.x before 5.6.10 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument save method or (2) the GD imagepsloadfont function, as demonstrated by a filename\0.html attack that bypasses an intended configuration in which client users may write to only .html files.
Vendor | Product | Version | CPE |
---|---|---|---|
redhat | enterprise_linux_desktop | 7.0 | cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_hpc_node | 7.0 | cpe:2.3:o:redhat:enterprise_linux_hpc_node:7.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_hpc_node_eus | 7.1 | cpe:2.3:o:redhat:enterprise_linux_hpc_node_eus:7.1:*:*:*:*:*:*:* |
redhat | enterprise_linux_server | 7.0 | cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:* |
redhat | enterprise_linux_server_eus | 7.1 | cpe:2.3:o:redhat:enterprise_linux_server_eus:7.1:*:*:*:*:*:*:* |
redhat | enterprise_linux_workstation | 7.0 | cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:* |
php | php | * | cpe:2.3:a:php:php:*:*:*:*:*:*:*:* |
php | php | 5.5.0 | cpe:2.3:a:php:php:5.5.0:*:*:*:*:*:*:* |
php | php | 5.5.1 | cpe:2.3:a:php:php:5.5.1:*:*:*:*:*:*:* |
php | php | 5.5.2 | cpe:2.3:a:php:php:5.5.2:*:*:*:*:*:*:* |
php.net/ChangeLog-5.php
rhn.redhat.com/errata/RHSA-2015-1135.html
rhn.redhat.com/errata/RHSA-2015-1186.html
rhn.redhat.com/errata/RHSA-2015-1187.html
rhn.redhat.com/errata/RHSA-2015-1218.html
rhn.redhat.com/errata/RHSA-2015-1219.html
www.debian.org/security/2015/dsa-3344
www.openwall.com/lists/oss-security/2015/06/16/12
www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
www.securityfocus.com/bid/75244
www.securitytracker.com/id/1032709
bugs.php.net/bug.php?id=69719
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
AI Score
Confidence
High
EPSS
Percentile
79.7%