CVE-2017-9841
| CVE Published | 2017-06-27 |
|---|---|
| Related CWE(s) | CWE-94: Improper Control of Generation of Code ('Code Injection') |
| Related Vendor(s) | oracle, phpunit_project |
| Related Product(s) | phpunit, communications_diameter_signaling_router |
| Exploitation Reported (CISA KEV) | 2022-02-15 |
| CVSS 3 Base Score | 9.8 (CRITICAL) |
| CVSS 3 Attack Complexity | LOW |
| CVSS 3 Attack Vector | NETWORK |
Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph