This script is Copyright (C) 2013 Tenable Network Security, Inc.
The remote FreeBSD host is missing one or more security-related
The PHP development team reports :
PHP does not validate the relationship between the soap.wsdl_cache_dir
directive and the open_basedir directive, which allows remote
attackers to bypass intended access restrictions by triggering the
creation of cached SOAP WSDL files in an arbitrary directory.
The SOAP parser in PHP allows remote attackers to read arbitrary files
via a SOAP WSDL file containing an XML external entity declaration in
conjunction with an entity reference, related to an XML External
Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory
See also :
Update the affected packages.
Risk factor :
High / CVSS Base Score : 7.5