6.5
CVSSv3

CVE-2015-3411

Published: 16/05/2016 Updated: 07/11/2023
CVSS v2 Base Score: 6.4 | Impact Score: 4.9 | Exploitability Score: 10
CVSS v3 Base Score: 6.5 | Impact Score: 2.5 | Exploitability Score: 3.9
VMScore: 570
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

PHP prior to 5.4.40, 5.5.x prior to 5.5.24, and 5.6.x prior to 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote malicious users to read or write to arbitrary files via crafted input to an application that calls (1) a DOMDocument load method, (2) the xmlwriter_open_uri function, (3) the finfo_file function, or (4) the hash_hmac_file function, as demonstrated by a filename\0.xml attack that bypasses an intended configuration in which client users may read only .xml files.

Vulnerable Product Search on Vulmon Subscribe to Product

redhat enterprise linux 7.0

redhat enterprise linux 6.0

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux hpc node 7.0

redhat enterprise linux server eus 7.1

redhat enterprise linux hpc node eus 7.1

php php 5.6.1

php php 5.6.5

php php

php php 5.5.19

php php 5.5.0

php php 5.5.16

php php 5.6.0

php php 5.5.1

php php 5.5.5

php php 5.6.4

php php 5.5.21

php php 5.6.6

php php 5.5.17

php php 5.5.14

php php 5.5.7

php php 5.6.2

php php 5.5.12

php php 5.5.6

php php 5.6.7

php php 5.5.3

php php 5.5.23

php php 5.5.8

php php 5.5.15

php php 5.5.11

php php 5.5.13

php php 5.5.4

php php 5.5.10

php php 5.6.3

php php 5.5.22

php php 5.5.18

php php 5.5.20

php php 5.5.2

php php 5.5.9

Vendor Advisories

Several security issues were fixed in PHP ...
It was found that certain PHP functions did not properly handle file names containing a NULL character A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions ...