Directory traversal vulnerability in the PharData class in PHP before 5.4.44, 5.5.x before 5.5.28, and 5.6.x before 5.6.12 allows remote attackers to write to arbitrary files via a .. (dot dot) in a ZIP archive entry that is mishandled during an extractTo call.
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Link | Tags |
---|---|
http://www.debian.org/security/2015/dsa-3344 | vendor advisory |
https://bugs.php.net/bug.php?id=70019 | |
http://www.openwall.com/lists/oss-security/2015/08/19/3 | mailing list |
http://www.php.net/ChangeLog-5.php | |
https://security.gentoo.org/glsa/201606-10 | vendor advisory |