First published: Tue Mar 05 2013(Updated: )
A security flaw was found in the way SOAP parser of PHP processed certain SOAP objects (due to allowed expansion of XML external entities during SOAP WSDL files parsing, it was previously possible to read arbitrary system files, accessible with the privileges of the PHP application). If a PHP application accepted untrusted SOAP object input remotely from clients, an attacker could use this flaw for unauthorized of read system files (accesible with the privileges of the PHP application). References: [1] <a href="http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702221">http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702221</a> [2] <a href="https://bugs.gentoo.org/show_bug.cgi?id=459904">https://bugs.gentoo.org/show_bug.cgi?id=459904</a> [3] <a href="http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2013:016/">http://www.mandriva.com/en/support/security/advisories/advisory/MDVSA-2013:016/</a> Relevant upstream patch: [4] <a href="http://git.php.net/?p=php-src.git;a=commitdiff;h=c737b89473df9dba6742b8fc8fbf6d009bf05c36">http://git.php.net/?p=php-src.git;a=commitdiff;h=c737b89473df9dba6742b8fc8fbf6d009bf05c36</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/php | <5.3.23 | 5.3.23 |
redhat/php | <5.4.13 | 5.4.13 |
PHP PHP | <=5.3.21 | |
PHP PHP | =1.0 | |
PHP PHP | =2.0 | |
PHP PHP | =2.0b10 | |
PHP PHP | =3.0 | |
PHP PHP | =3.0.1 | |
PHP PHP | =3.0.2 | |
PHP PHP | =3.0.3 | |
PHP PHP | =3.0.4 | |
PHP PHP | =3.0.5 | |
PHP PHP | =3.0.6 | |
PHP PHP | =3.0.7 | |
PHP PHP | =3.0.8 | |
PHP PHP | =3.0.9 | |
PHP PHP | =3.0.10 | |
PHP PHP | =3.0.11 | |
PHP PHP | =3.0.12 | |
PHP PHP | =3.0.13 | |
PHP PHP | =3.0.14 | |
PHP PHP | =3.0.15 | |
PHP PHP | =3.0.16 | |
PHP PHP | =3.0.17 | |
PHP PHP | =3.0.18 | |
PHP PHP | =4.0-beta_4_patch1 | |
PHP PHP | =4.0-beta1 | |
PHP PHP | =4.0-beta2 | |
PHP PHP | =4.0-beta3 | |
PHP PHP | =4.0-beta4 | |
PHP PHP | =4.0.0 | |
PHP PHP | =4.0.1 | |
PHP PHP | =4.0.2 | |
PHP PHP | =4.0.3 | |
PHP PHP | =4.0.4 | |
PHP PHP | =4.0.5 | |
PHP PHP | =4.0.6 | |
PHP PHP | =4.0.7 | |
PHP PHP | =4.1.0 | |
PHP PHP | =4.1.1 | |
PHP PHP | =4.1.2 | |
PHP PHP | =4.2.0 | |
PHP PHP | =4.2.1 | |
PHP PHP | =4.2.2 | |
PHP PHP | =4.2.3 | |
PHP PHP | =4.3.0 | |
PHP PHP | =4.3.1 | |
PHP PHP | =4.3.2 | |
PHP PHP | =4.3.3 | |
PHP PHP | =4.3.4 | |
PHP PHP | =4.3.5 | |
PHP PHP | =4.3.6 | |
PHP PHP | =4.3.7 | |
PHP PHP | =4.3.8 | |
PHP PHP | =4.3.9 | |
PHP PHP | =4.3.10 | |
PHP PHP | =4.3.11 | |
PHP PHP | =4.4.0 | |
PHP PHP | =4.4.1 | |
PHP PHP | =4.4.2 | |
PHP PHP | =4.4.3 | |
PHP PHP | =4.4.4 | |
PHP PHP | =4.4.5 | |
PHP PHP | =4.4.6 | |
PHP PHP | =4.4.7 | |
PHP PHP | =4.4.8 | |
PHP PHP | =4.4.9 | |
PHP PHP | =5.0.0 | |
PHP PHP | =5.0.0-beta1 | |
PHP PHP | =5.0.0-beta2 | |
PHP PHP | =5.0.0-beta3 | |
PHP PHP | =5.0.0-beta4 | |
PHP PHP | =5.0.0-rc1 | |
PHP PHP | =5.0.0-rc2 | |
PHP PHP | =5.0.0-rc3 | |
PHP PHP | =5.0.1 | |
PHP PHP | =5.0.2 | |
PHP PHP | =5.0.3 | |
PHP PHP | =5.0.4 | |
PHP PHP | =5.0.5 | |
PHP PHP | =5.1.0 | |
PHP PHP | =5.1.1 | |
PHP PHP | =5.1.2 | |
PHP PHP | =5.1.3 | |
PHP PHP | =5.1.4 | |
PHP PHP | =5.1.5 | |
PHP PHP | =5.1.6 | |
PHP PHP | =5.2.0 | |
PHP PHP | =5.2.1 | |
PHP PHP | =5.2.2 | |
PHP PHP | =5.2.3 | |
PHP PHP | =5.2.4 | |
PHP PHP | =5.2.5 | |
PHP PHP | =5.2.6 | |
PHP PHP | =5.2.7 | |
PHP PHP | =5.2.8 | |
PHP PHP | =5.2.9 | |
PHP PHP | =5.2.10 | |
PHP PHP | =5.2.11 | |
PHP PHP | =5.2.12 | |
PHP PHP | =5.2.13 | |
PHP PHP | =5.2.14 | |
PHP PHP | =5.2.15 | |
PHP PHP | =5.2.16 | |
PHP PHP | =5.2.17 | |
PHP PHP | =5.3.0 | |
PHP PHP | =5.3.1 | |
PHP PHP | =5.3.2 | |
PHP PHP | =5.3.3 | |
PHP PHP | =5.3.4 | |
PHP PHP | =5.3.5 | |
PHP PHP | =5.3.6 | |
PHP PHP | =5.3.7 | |
PHP PHP | =5.3.8 | |
PHP PHP | =5.3.9 | |
PHP PHP | =5.3.10 | |
PHP PHP | =5.3.11 | |
PHP PHP | =5.3.12 | |
PHP PHP | =5.3.13 | |
PHP PHP | =5.3.14 | |
PHP PHP | =5.3.15 | |
PHP PHP | =5.3.16 | |
PHP PHP | =5.3.17 | |
PHP PHP | =5.3.18 | |
PHP PHP | =5.3.19 | |
PHP PHP | =5.3.20 | |
PHP PHP | =5.4.0 | |
PHP PHP | =5.4.1 | |
PHP PHP | =5.4.2 | |
PHP PHP | =5.4.3 | |
PHP PHP | =5.4.4 | |
PHP PHP | =5.4.5 | |
PHP PHP | =5.4.6 | |
PHP PHP | =5.4.7 | |
PHP PHP | =5.4.8 | |
PHP PHP | =5.4.9 | |
PHP PHP | =5.4.10 | |
PHP PHP | =5.4.11 | |
PHP PHP | =5.4.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.