CVE-2013-6501

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.

References

http://lists.opensuse.org/opensuse-security-announce/2015-03/msg00003.html

http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html

http://www.securityfocus.com/bid/72530

https://bugzilla.redhat.com/show_bug.cgi?id=1009103

https://security.gentoo.org/glsa/201606-10

Details

Source: MITRE

Published: 2015-03-30

Updated: 2016-11-30

Type: CWE-74

Risk Information

CVSS v2

Base Score: 4.6

Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Impact Score: 6.4

Exploitability Score: 3.9

Severity: MEDIUM

Tenable Plugins

View all (3 total)

IDNameProductFamilySeverity
91704GLSA-201606-10 : PHP: Multiple vulnerabilitiesNessusGentoo Local Security Checks
critical
8789PHP 5.4.x < 5.4.40 / 5.5.x < 5.5.24 / 5.6.x < 5.6.8 'php_sdl.c' WSDL InjectionNessus Network MonitorWeb Servers
medium
81665SuSE 11.3 Security Update : PHP 5.3 (SAT Patch Number 10370)NessusSuSE Local Security Checks
high