Description
ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-3689-1 | php5 security update |
EUVD |
EUVD-2016-8003 | ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection. |
Ubuntu USN |
USN-3095-1 | PHP vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T01:50:47.525Z
Reserved: 2016-09-02T00:00:00.000Z
Link: CVE-2016-7125
No data.
Status : Modified
Published: 2016-09-12T01:59:03.427
Modified: 2026-05-06T22:30:45.220
Link: CVE-2016-7125
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
EUVD
Ubuntu USN