The Phar extension in PHP before 5.5.34, 5.6.x before 5.6.20, and 7.x before 7.0.5 allows remote attackers to execute arbitrary code via a crafted filename, as demonstrated by mishandling of \0 characters by the phar_analyze_path function in ext/phar/phar.c.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2016-05-20 11:00
Updated : 2024-02-04 18:53
NVD link : CVE-2016-4072
Mitre link : CVE-2016-4072
CVE.ORG link : CVE-2016-4072
JSON object : View
Products Affected
apple
- mac_os_x
php
- php
CWE
CWE-20
Improper Input Validation