CVE-2015-3412

Severity
5.3MEDIUM
EPSS
1.0%
top 22.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMay 16
Latest updateMay 14

Description

PHP before 5.4.40, 5.5.x before 5.5.24, and 5.6.x before 5.6.8 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to read arbitrary files via crafted input to an application that calls the stream_resolve_include_path function in ext/standard/streamsfuncs.c, as demonstrated by a filename\0.extension attack that bypasses an intended configuration in which client users may read files with only one specific extension.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages6 packages

Ubuntuphp5< 5.5.9+dfsg-1ubuntu4.11
NVDphp/php5.4.39+32

Also affects: Enterprise Linux 6.0, 7.0, 7.1

🔴Vulnerability Details

4
GHSA
GHSA-25q8-485x-mwx9: PHP before 52022-05-14
CVEList
CVE-2015-3412: PHP before 52016-05-16
OSV
php5 vulnerabilities2015-07-06
OSV
CVE-2015-3412: PHP before 52015-06-23

📋Vendor Advisories

2
Ubuntu
PHP vulnerabilities2015-07-06
Red Hat
php: missing null byte checks for paths in various PHP extensions2015-04-16

💬Community

2
Bugzilla
CVE-2015-3412 php: missing null byte checks for paths in various PHP extensions2015-06-17
Bugzilla
CVE-2015-4598 php: missing null byte checks for paths in DOM and GD extensions2015-06-17
CVE-2015-3412 (MEDIUM CVSS 5.3) | PHP before 5.4.40 | cvebase.io