CVE-2017-9841
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
27/06/2017
Last modified:
20/04/2025
Description
Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:phpunit_project:phpunit:*:*:*:*:*:*:*:* | 4.8.27 (including) | |
cpe:2.3:a:phpunit_project:phpunit:*:*:*:*:*:*:*:* | 5.0.0 (including) | 5.6.3 (excluding) |
cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* | 8.0.0 (including) | 8.5.0 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/
- http://www.securityfocus.com/bid/101798
- http://www.securitytracker.com/id/1039812
- https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5
- https://github.com/sebastianbergmann/phpunit/pull/1956
- https://security.gentoo.org/glsa/201711-15
- https://www.oracle.com/security-alerts/cpuoct2021.html
- http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/
- http://www.securityfocus.com/bid/101798
- http://www.securitytracker.com/id/1039812
- https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5
- https://github.com/sebastianbergmann/phpunit/pull/1956
- https://security.gentoo.org/glsa/201711-15
- https://www.oracle.com/security-alerts/cpuoct2021.html