ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.
Link | Tags |
---|---|
http://www.php.net/ChangeLog-7.php | release notes |
https://bugs.php.net/bug.php?id=72681 | issue tracking exploit |
https://security.gentoo.org/glsa/201611-22 | vendor advisory |
https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce?w=1 | issue tracking patch |
http://www.securitytracker.com/id/1036680 | vdb entry |
http://rhn.redhat.com/errata/RHSA-2016-2750.html | vendor advisory |
http://www.php.net/ChangeLog-5.php | release notes |
https://www.tenable.com/security/tns-2016-19 | |
http://openwall.com/lists/oss-security/2016/09/02/9 | mailing list |
http://www.securityfocus.com/bid/92552 | vdb entry |