First published: Tue Jan 19 2016(Updated: )
The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =7.0.0 | |
PHP | =7.0.0-alpha1 | |
PHP | =7.0.0-alpha2 | |
PHP | =7.0.0-beta1 | |
PHP | =7.0.0-beta2 | |
PHP | =7.0.0-beta3 | |
PHP | =7.0.0-rc1 | |
PHP | =7.0.0-rc2 | |
PHP | =7.0.0-rc3 | |
PHP | =7.0.0-rc4 | |
PHP | =7.0.0-rc5 | |
PHP | =7.0.0-rc6 | |
PHP | =7.0.0-rc7 | |
PHP | =7.0.0-rc8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6527 is considered a critical vulnerability due to the potential for remote code execution.
To mitigate CVE-2015-6527, upgrade to PHP version 7.0.0 or later.
CVE-2015-6527 affects PHP versions prior to 7.0.0, including alpha, beta, and release candidates.
Yes, CVE-2015-6527 can be exploited remotely by attackers to execute arbitrary code.
There are no known workarounds for CVE-2015-6527, so upgrading is the recommended solution.