ext/session/session.c in PHP prior to 5.6.25 and 7.x prior to 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote malicious users to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
php php |
||
php php 7.0.0 |
||
php php 7.0.1 |
||
php php 7.0.4 |
||
php php 7.0.5 |
||
php php 7.0.2 |
||
php php 7.0.3 |
||
php php 7.0.9 |
||
php php 7.0.6 |
||
php php 7.0.7 |
||
php php 7.0.8 |