7.5
CVSSv2

CVE-2016-6175

Published: 07/02/2017 Updated: 03/09/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Eval injection vulnerability in php-gettext 1.0.12 and previous versions allows remote malicious users to execute arbitrary PHP code via a crafted plural forms header.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php-gettext project php-gettext

Vendor Advisories

Debian Bug report logs - #851771 php-gettext: CVE-2016-6175 Package: src:php-gettext; Maintainer for src:php-gettext is Debian PHP PEAR Maintainers <pkg-php-pear@listsaliothdebianorg>; Reported by: Salvatore Bonaccorso <carnil@debianorg> Date: Wed, 18 Jan 2017 16:24:12 UTC Severity: grave Tags: buster-ignore, jes ...

Exploits

[CVE-2016-6175] gettextphp <= 1012 unauthenticated code execution with POTENTIAL privileges escalation # Date: June 25th, 2016 # Author: kmkz (Bourbon Jean-marie) <mailbourbon@gmailcom> | @kmkz_security # Project Homepage: launchpadnet/php-gettext/ # Download: launchpadnet/php-gettext/trunk/1012/+download/php-gett ...
PHP gettextphp versions 1012 and below suffer from an unauthenticated code execution vulnerability ...

Github Repositories

Translation API for PHP using Gettext MO files

motranslator Translation API for PHP using Gettext MO files Features All strings are stored in memory for fast lookup Fast loading of MO files Low level API for reading MO files Emulation of Gettext API No use of eval() for plural equation Limitations Default InMemoryCache not suitable for huge MO files which you don't want to store in memory Input and output encod