#VU16138 Deserialization of Untrusted Data in PHP - CVE-2016-7124
Published: November 28, 2018
PHP
PHP Group
Description
The vulnerability allows a remote attacker to execute arbitrary code on the target system.
The vulnerability exists due to insecure input validation when processing certain objects in "ext/standard/var_unserializer.c" PHP extension. A remote attacker can pass specially crafted data to the application and execute arbitrary code on the target system via "__destruct" or "magic" method calls.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Remediation
External links
- http://openwall.com/lists/oss-security/2016/09/02/9
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-7.php
- http://www.securityfocus.com/bid/92756
- http://www.securitytracker.com/id/1036680
- https://bugs.php.net/bug.php?id=72663
- https://github.com/php/php-src/commit/20ce2fe8e3c211a42fee05a461a5881be9a8790e?w=1
- https://security.gentoo.org/glsa/201611-22
- https://www.tenable.com/security/tns-2016-19