Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2015-4148Improper Input Validation in Apple MAC OS X

Severity
5.0MEDIUMNVD
EPSS
16.9%
top 5.02%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedJun 9
Latest updateMay 14

Description

The do_soap_call function in ext/soap/soap.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 does not verify that the uri property is a string, which allows remote attackers to obtain sensitive information by providing crafted serialized data with an int data type, related to a "type confusion" issue.

CVSS vector

AV:N/AC:L/C:P/I:N/A:NExploitability: 10.0 | Impact: 2.9

Affected Packages7 packages

Ubuntuphp5/php5< 5.5.9+dfsg-1ubuntu4.11
NVDphp/php5.4.38+26
NVDapple/mac_os_x10.10.4

Also affects: Enterprise Linux 7.1

Patches

🔴Vulnerability Details

3
GHSA
GHSA-88qx-xxqp-phh3: The do_soap_call function in ext/soap/soap2022-05-14
OSV
CVE-2015-4148: The do_soap_call function in ext/soap/soap2015-06-09
CVEList
CVE-2015-4148: The do_soap_call function in ext/soap/soap2015-06-09

💥Exploits & PoCs

1
Exploit-DB
SMF (Simple Machine Forum) 2.0.10 - Remote Memory Exfiltration2015-09-24

📋Vendor Advisories

3
Ubuntu
PHP vulnerabilities2015-07-06
Red Hat
php: SoapClient's do_soap_call() type confusion after unserialize()2015-03-03
Apple
CVE-2015-4148: OS X Yosemite v10.10.5 and Security Update 2015-006

💬Community

1
Bugzilla
CVE-2015-4148 php: SoapClient's do_soap_call() type confusion after unserialize()2015-06-01
CVE-2015-4148 — Improper Input Validation in Apple | cvebase