First published: Sun Nov 13 2016(Updated: )
PHPUnit allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/phpunit/phpunit | >=5.0.10<5.6.3>=4.8.19<4.8.28 | |
Phpunit Project Phpunit | <=4.8.27 | |
Phpunit Project Phpunit | >=5.0.0<5.6.3 | |
Oracle Communications Diameter Signaling Router | >=8.0.0<=8.5.0 | |
PHPUnit unit testing framework | ||
Apache HTTP server | ||
Laravel web application framework | ||
composer/phpunit/phpunit | >=5.0.10<5.6.3 | 5.6.3 |
composer/phpunit/phpunit | >=4.8.19<4.8.28 | 4.8.28 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.