PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.
                
            References
                    Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Configuration 2 (hide)
                                
                                
  | 
                        
Configuration 3 (hide)
                                
                                
  | 
                        
Information
                Published : 2016-05-16 03:59
Updated : 2019-04-22 10:48
NVD link : CVE-2015-3412
Mitre link : CVE-2015-3412
JSON object : View
CWE
                Products Affected
                redhat
- enterprise_linux_desktop
 - enterprise_linux_hpc_node
 - enterprise_linux
 - enterprise_linux_workstation
 - enterprise_linux_server_eus
 - enterprise_linux_hpc_node_eus
 - enterprise_linux_server
 
php
- php
 


