The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Information
Published : 2016-05-20 04:00
Updated : 2018-01-04 18:30
NVD link : CVE-2016-4072
Mitre link : CVE-2016-4072
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
apple
- mac_os_x
php
- php