PHP 'pcnt _ exec () 'function null character Security Restriction Bypass Vulnerability
PHP 'pcnt _ exec () 'function null character Security Restriction Bypass Vulnerability
Release date:
Updated on:
Affected Systems:
PHP <5.6.9
PHP <5.5.25
PHP <5.4.41
Description:
Bugtraq id: 75056
CVE (CAN) ID: CVE-2015-4026
PHP is a widely used scripting language. It is especially suitable for Web development and can be embedded into HTML.
In the implementation of pcntl_exec, path names are truncated when PHP versions earlier than 5.4.41, 5.5.x versions earlier than 5.5.5.25, and 5.6.9 are 5.6.x versions earlier than 5.6.9. Remote attackers construct the first parameter, attackers can exploit this vulnerability to bypass target extension restrictions and execute files with unexpected names.
<* Source: yohgaki
*>
Suggestion:
Vendor patch:
PHP
---
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Https://bugs.php.net/bug.php? Id = 68598
Http://php.net/ChangeLog-5.php
Experience PHP 7.0 on CentOS 7.x/Fedora 21
Install LNMP in CentOS 6.3 (PHP 5.4, MyySQL5.6)
Nginx startup failure occurs during LNMP deployment.
Ubuntu install Nginx php5-fpm MySQL (LNMP environment setup)
Detailed php hd scanning PDF + CD source code + full set of teaching videos
Configure the php lnmp development environment in CentOS 6
PHP details: click here
PHP: click here
This article permanently updates the link address: