First published: Mon Sep 16 2013(Updated: )
The SOAP parser in PHP before 5.3.22 and 5.4.x before 5.4.12 allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Enterprise Linux | =5 | |
Red Hat Enterprise Linux | =6.0 | |
Apple iOS and macOS | >=10.0.0<10.8.5 | |
PHP | <5.3.22 | |
PHP | >=5.4.0<5.4.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1824 has been classified as a moderate severity vulnerability due to its potential impact allowing unauthorized access to sensitive files.
To fix CVE-2013-1824, upgrade PHP to version 5.3.23 or later, or to 5.4.13 or later.
CVE-2013-1824 affects PHP versions prior to 5.3.23 and 5.4.x prior to 5.4.13, along with specific versions of Red Hat Enterprise Linux and macOS.
CVE-2013-1824 is an XML External Entity (XXE) vulnerability that allows for arbitrary file reading.
Yes, CVE-2013-1824 can be exploited remotely by attackers through specially crafted SOAP WSDL files.