CVE-2017-9841

Name
CVE-2017-9841
Description
Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
NVD Severity
unknown
Other trackers
Mailing lists
Exploits
Forges
GitHub (code, issues), Aports (code, issues)

References

Type URI
MISC http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/
vdb-entry http://www.securityfocus.com/bid/101798
vdb-entry http://www.securitytracker.com/id/1039812
MISC https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5
MISC https://github.com/sebastianbergmann/phpunit/pull/1956
vendor-advisory https://security.gentoo.org/glsa/201711-15
MISC https://www.oracle.com/security-alerts/cpuoct2021.html

Match rules

CPE URI Source package Min version Max version
n/a == n/a == n/a
cpe:2.3:a:phpunit_project:phpunit:*:*:*:*:*:*:*:* phpunit >= None <= 4.8.27
cpe:2.3:a:phpunit_project:phpunit:*:*:*:*:*:*:*:* phpunit >= 5.0.0 < 5.6.3

Vulnerable and fixed packages

Source package Branch Version Maintainer Status