CISA KEV 정보
| 취약점명 | PHPUnit Command Injection Vulnerability |
|---|---|
| 설명 | PHPUnit allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a " |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-94 |
| 등록일 (KEV) | 2022-02-15 |
| 조치 기한 | 2022-08-15 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2017-9841 |
NVD 상세 정보
CVSS v3.1: 9.8 CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HCVSS v2.0: 7.5
AV:N/AC:L/Au:N/C:P/I:P/A:P설명: Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "
CWE: CWE-94 | CWE-94
참조
- http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/ [Third Party Advisory]
- http://www.securityfocus.com/bid/101798 [Broken Link]
- http://www.securitytracker.com/id/1039812 [Broken Link]
- https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5 [Patch, Third Party Advisory]
- https://github.com/sebastianbergmann/phpunit/pull/1956 [Patch, Third Party Advisory]
- https://security.gentoo.org/glsa/201711-15 [Third Party Advisory]
- https://www.oracle.com/security-alerts/cpuoct2021.html [Patch, Third Party Advisory]
- http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/ [Third Party Advisory]
- http://www.securityfocus.com/bid/101798 [Broken Link]
- http://www.securitytracker.com/id/1039812 [Broken Link]
- https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5 [Patch, Third Party Advisory]
- https://github.com/sebastianbergmann/phpunit/pull/1956 [Patch, Third Party Advisory]
- https://security.gentoo.org/glsa/201711-15 [Third Party Advisory]
- https://www.oracle.com/security-alerts/cpuoct2021.html [Patch, Third Party Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-9841
This product uses the NVD API but is not endorsed or certified by the NVD.