|
[Japanese]
|
JVNDB-2015-000101
|
PHP for Windows vulnerable to OS command injection
|
PHP for Windows contains an OS command injection due to a processing flaw in the escapeshellarg function.
Masahiro Yamada reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
|
CVSS V2 Severity: Base Metrics 6.8 (Medium) [IPA Score]
- Access Vector: Network
- Access Complexity: Medium
- Authentication: None
- Confidentiality Impact: Partial
- Integrity Impact: Partial
- Availability Impact: Partial
|
|
The PHP Group
- PHP for Windows versions prior to 5.4.42
- PHP for Windows versions prior to 5.5.26
- PHP for Windows versions prior to 5.6.10
|
|
Specifying a specially crafted parameter in the escapeshellarg function may result in an arbitrary OS command being executed.
|
[Apply the patch]
Apply the patch according to the infomration provided by the developer.
|
The PHP Group
Turbolinux, Inc.
|
- OS Command Injection(CWE-78) [IPA Evaluation]
|
- CVE-2015-4642
|
- JVN : JVN#73568461
- National Vulnerability Database (NVD) : CVE-2015-4642
- IPA SECURITY ALERTS : Security Alert for Vulnerability in PHP for Windows (JVN#73568461) (in Japanese)
|
- [2015/07/17]
Web page was published
[2015/07/22]
References : Content was added
[2015/07/30]
Vendor Information : Content was added
[2016/05/19]
References : Content was added
Vendor Information : Content was added
|