Snyk has a published code exploit for this vulnerability.
The probability is the direct output of the EPSS model, and conveys an overall sense of the threat of exploitation in the wild. The percentile measures the EPSS probability relative to all known EPSS scores. Note: This data is updated daily, relying on the latest available EPSS model version. Check out the EPSS documentation for more details.
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Arbitrary Code Execution vulnerabilities in an interactive lesson.
Start learningUpgrade phpunit/phpunit
to version 5.6.3, 4.8.28 or higher.
Affected versions of phpunit/phpunit
are vulnerable to Arbitrary Code Execution.
Usually, phpunit
is deployed using composer, a very popular dependency manager for PHP. In most cases phpunit
isn't required for the production environment, but nonetheless it is installed. Placing composer modules into web accessible directory is another common mistake that allows direct exploitation of this vulnerability.
Vulnerability is located in /phpunit/src/Util/PHP/eval-stdin.php
file. Before patch this file contained:
eval('?>'.file_get_contents('php://input'));
that could be used to run arbitrary PHP code.