CVE-2017-9841
CVE Published | 2017-06-27 |
---|---|
Related CWE(s) | CWE-94: Improper Control of Generation of Code ('Code Injection') |
Related Vendor(s) | oracle, phpunit_project |
Related Product(s) | communications_diameter_signaling_router, phpunit |
Exploitation Reported (CISA KEV) | 2022-02-15 |
CVSS 3 Base Score | 9.8 (CRITICAL) |
CVSS 3 Attack Complexity | LOW |
CVSS 3 Attack Vector | NETWORK |
Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
Cyber Threat Graph Context
Explore how this CVE relates to the wider threat graph