Improper Neutralization of Special Elements in Output Used by a Downstream Component in PHP - CVE-2013-6501

 

Improper Neutralization of Special Elements in Output Used by a Downstream Component in PHP - CVE-2013-6501

Published: November 30, 2016 / Updated: June 8, 2025


Vulnerability identifier: #VU110276
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2013-6501
CWE-ID: CWE-74
Exploitation vector: Local access
Exploit availability: No public exploit available
Vendor: PHP Group
Affected software:
PHP

Detailed vulnerability description

The vulnerability allows a local user to read and manipulate data.

The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_sdl function in ext/soap/php_sdl.c.


How to mitigate CVE-2013-6501

Install update from vendor's website.

Sources