5.3
CVSSv3

CVE-2015-3412

Published: 16/05/2016 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

PHP prior to 5.4.40, 5.5.x prior to 5.5.24, and 5.6.x prior to 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote malicious users to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.6.1

php php 5.6.5

php php

php php 5.5.19

php php 5.5.0

php php 5.5.16

php php 5.6.0

php php 5.5.1

php php 5.5.5

php php 5.6.4

php php 5.5.21

php php 5.6.6

php php 5.5.17

php php 5.5.14

php php 5.5.7

php php 5.6.2

php php 5.5.12

php php 5.5.6

php php 5.6.7

php php 5.5.3

php php 5.5.23

php php 5.5.8

php php 5.5.15

php php 5.5.11

php php 5.5.13

php php 5.5.4

php php 5.5.10

php php 5.6.3

php php 5.5.22

php php 5.5.18

php php 5.5.20

php php 5.5.2

php php 5.5.9

redhat enterprise linux desktop 7.0

redhat enterprise linux workstation 7.0

redhat enterprise linux server 7.0

redhat enterprise linux hpc node 7.0

redhat enterprise linux server eus 7.1

redhat enterprise linux hpc node eus 7.1

redhat enterprise linux 7.0

redhat enterprise linux 6.0

Vendor Advisories

Several security issues were fixed in PHP ...
It was found that certain PHP functions did not properly handle file names containing a NULL character A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions ...