Arbitrary Code Injection Affecting php package, versions [,5.6.8)


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (18th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-PHP-2335361
  • published12 Jan 2022
  • disclosed30 Mar 2015
  • creditUnknown

Introduced: 30 Mar 2015

CVE-2013-6501  (opens in a new tab)
CWE-74  (opens in a new tab)

How to fix?

Upgrade php to version 5.6.8 or higher.

Overview

Affected versions of this package are vulnerable to Arbitrary Code Injection. The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.

CVSS Scores

version 3.1