Release date:
Updated on:
Affected Systems:
PHP 5.3.13
PHP 5.3.12
PHP 5.3.11
PHP 5.3.10
PHP 5.3.1
PHP 5.3
Description:
--------------------------------------------------------------------------------
Bugtraq id: 58224
CVE (CAN) ID: CVE-2013-1635, CVE-2013-1643
PHP is an embedded HTML language. It is a scripting language that executes HTML documents embedded on the server. It is widely used in a style similar to C language.
PHP 5.3.22 did not verify the configuration command directive SOAP. wsdl_cache_dir before writing the soap wsdl cache file to the file system. In this way, attackers can write any wsdl file to any location. PHP allows attackers to read arbitrary files by using external entities when parsing SOAP wsdl files. If a Web application deserializes user-supplied data and tries to execute the methods, attackers can send initialized serialized SoapClient objects in non-wsdl mode, enables PHP to automatically parse the remote XML document specified by the location option parameter.
<* Source: vendor
Link: http://packetstormsecurity.com/files/cve/CVE-2013-1635
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
PHP
---
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.php.net