The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.
                
            References
                    Configurations
                    Configuration 1 (hide)
                                
                                
  | 
                        
Configuration 2 (hide)
                                
                                
  | 
                        
Configuration 3 (hide)
                                
                                
  | 
                        
Configuration 4 (hide)
                                
                                
  | 
                        
Information
                Published : 2016-05-20 04:00
Updated : 2018-01-04 18:30
NVD link : CVE-2016-4072
Mitre link : CVE-2016-4072
JSON object : View
CWE
                
                    
                        
                        CWE-20
                        
            Improper Input Validation
Products Affected
                apple
- mac_os_x
 
php
- php
 


