First published: Wed Feb 01 2017(Updated: )
PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PEAR | =1.10.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-5630 is considered a medium severity vulnerability due to its potential for file overwriting.
To fix CVE-2017-5630, ensure you upgrade the PEAR package to a version that includes the validation of file types and filenames.
CVE-2017-5630 allows remote HTTP servers to conduct file overwriting attacks by exploiting improper file validation.
CVE-2017-5630 specifically affects PEAR Base System version 1.10.1.
CVE-2017-5630 is particularly noted for its potential to exploit .htaccess file overwrites.