The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
No history.
Information
Published : 2015-06-09 18:59
Updated : 2019-04-22 17:48
NVD link : CVE-2015-4026
Mitre link : CVE-2015-4026
CVE.ORG link : CVE-2015-4026
JSON object : View
Products Affected
redhat
- enterprise_linux_server
- enterprise_linux_hpc_node
- enterprise_linux_hpc_node_eus
- enterprise_linux_desktop
- enterprise_linux_server_eus
- enterprise_linux
- enterprise_linux_workstation
apple
- mac_os_x
php
- php
CWE
CWE-19
Data Processing Errors