ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
http://openwall.com/lists/oss-security/2016/09/02/9
http://rhn.redhat.com/errata/RHSA-2016-2750.html
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-7.php
http://www.securityfocus.com/bid/92552
http://www.securitytracker.com/id/1036680
https://bugs.php.net/bug.php?id=72681
https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1
Source: MITRE
Published: 2016-09-12
Updated: 2018-01-05
Type: CWE-74
Base Score: 5
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N
Impact Score: 2.9
Exploitability Score: 10
Severity: MEDIUM
Base Score: 7.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Impact Score: 3.6
Exploitability Score: 3.9
Severity: HIGH
OR
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* versions up to 5.6.24 (inclusive)
OR
cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*
ID | Name | Product | Family | Severity |
---|---|---|---|---|
137966 | EulerOS Virtualization 3.0.6.0 : php (EulerOS-SA-2020-1747) | Nessus | Huawei Local Security Checks | critical |
132184 | EulerOS 2.0 SP3 : php (EulerOS-SA-2019-2649) | Nessus | Huawei Local Security Checks | critical |
131592 | EulerOS 2.0 SP2 : php (EulerOS-SA-2019-2438) | Nessus | Huawei Local Security Checks | critical |
129178 | EulerOS 2.0 SP5 : php (EulerOS-SA-2019-1984) | Nessus | Huawei Local Security Checks | high |
98834 | PHP 7.0.x < 7.0.10 Multiple Vulnerabilities | Web Application Scanning | Component Vulnerability | high |
98815 | PHP 5.6.x < 5.6.25 Multiple Vulnerabilities | Web Application Scanning | Component Vulnerability | high |
119981 | SUSE SLES12 Security Update : php7 (SUSE-SU-2016:2460-1) | Nessus | SuSE Local Security Checks | high |
119979 | SUSE SLES12 Security Update : php5 (SUSE-SU-2016:2408-1) | Nessus | SuSE Local Security Checks | high |
101047 | Tenable SecurityCenter PHP < 5.6.25 Multiple Vulnerabilities (TNS-2016-09) | Nessus | Misc. | high |
97478 | F5 Networks BIG-IP : PHP vulnerability (K35232053) | Nessus | F5 Networks Local Security Checks | medium |
96832 | Tenable SecurityCenter < 5.4.1 Multiple Vulnerabilities (TNS-2016-19) | Nessus | Misc. | high |
95421 | GLSA-201611-22 : PHP: Multiple vulnerabilities (httpoxy) | Nessus | Gentoo Local Security Checks | high |
93914 | Debian DSA-3689-1 : php5 - security update | Nessus | Debian Local Security Checks | high |
93894 | SUSE SLES11 Security Update : php53 (SUSE-SU-2016:2459-1) | Nessus | SuSE Local Security Checks | high |
93864 | Ubuntu 12.04 LTS / 14.04 LTS / 16.04 LTS : php5, php7.0 vulnerabilities (USN-3095-1) | Nessus | Ubuntu Local Security Checks | high |
93856 | openSUSE Security Update : php5 (openSUSE-2016-1156) | Nessus | SuSE Local Security Checks | high |
9551 | PHP 5.6.x < 5.6.25 / 7.0.x < 7.0.10 Multiple Vulnerabilities | Nessus Network Monitor | Web Servers | high |
93597 | openSUSE Security Update : php5 (openSUSE-2016-1095) | Nessus | SuSE Local Security Checks | high |
93589 | SUSE SLES11 Security Update : php53 (SUSE-SU-2016:2328-1) | Nessus | SuSE Local Security Checks | high |
93384 | Slackware 14.0 / 14.1 / 14.2 / current : php (SSA:2016-252-01) | Nessus | Slackware Local Security Checks | high |
93078 | PHP 7.0.x < 7.0.10 Multiple Vulnerabilities | Nessus | CGI abuses | high |
93077 | PHP 5.6.x < 5.6.25 Multiple Vulnerabilities | Nessus | CGI abuses | high |