CVE-2016-7125 PUBLISHED

ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.

EPSS 0.55% · 67.7th percentile

Risk Scores

EPSS Score
0.55%
67.7th percentile

Affected Products

VendorProductVersions
Ubuntu:14.04:LTSphp50, 5.5.3+dfsg-1ubuntu2, 5.5.3+dfsg-1ubuntu3
Ubuntu:16.04:LTSphp7.00, 7.0.1-5, 7.0.1-6

Timeline

References

Open in Interactive Console →