CVE-2014-4721
php: type confusion issue in phpinfo() leading to information leak
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.
La implementación phpinfo en ext/standard/info.c en PHP anterior a 5.4.30 y 5.5.x anterior a 5.5.14 no asegura el uso del tipo de datos de cadenas para las variables PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER y PHP_SELF, lo que podría permitir a atacantes dependientes de contexto obtener información sensible de la memoria de proceso mediante el uso de el tipo de datos de enteros con valores manipulados, relacionado con una vulnerabilidad de 'confusión de tipo', tal y como fue demostrado mediante la lectura de una clave SSL privada en un entorno de alojamiento web de Apache HTTP Server con mod_ssl y un 5.3.x mod_php de PHP.
A type confusion issue was found in PHP's phpinfo() function. A malicious script author could possibly use this flaw to disclose certain portions of server memory.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-07-06 CVE Reserved
- 2014-07-06 CVE Published
- 2024-07-04 EPSS Updated
- 2024-08-06 CVE Updated
- 2024-08-06 First Exploit
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
- CWE-201: Insertion of Sensitive Information Into Sent Data
CAPEC
References (16)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/54553 | Broken Link | |
http://secunia.com/advisories/59794 | Broken Link | |
http://secunia.com/advisories/59831 | Broken Link | |
http://twitter.com/mikispag/statuses/485713462258302976 | Third Party Advisory | |
http://www-01.ibm.com/support/docview.wss?uid=swg21683486 | Third Party Advisory | |
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html | Third Party Advisory |
URL | Date | SRC |
---|---|---|
https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html | 2024-08-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.html | 2023-01-19 | |
http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.html | 2023-01-19 | |
http://rhn.redhat.com/errata/RHSA-2014-1765.html | 2023-01-19 | |
http://rhn.redhat.com/errata/RHSA-2014-1766.html | 2023-01-19 | |
http://www.debian.org/security/2014/dsa-2974 | 2023-01-19 | |
http://www.php.net/ChangeLog-5.php | 2023-01-19 | |
https://bugs.php.net/bug.php?id=67498 | 2023-01-19 | |
https://access.redhat.com/security/cve/CVE-2014-4721 | 2014-10-30 | |
https://bugzilla.redhat.com/show_bug.cgi?id=1116662 | 2014-10-30 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 5.3.0 < 5.3.29 Search vendor "Php" for product "Php" and version " >= 5.3.0 < 5.3.29" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 5.4.0 < 5.4.30 Search vendor "Php" for product "Php" and version " >= 5.4.0 < 5.4.30" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | >= 5.5.0 < 5.5.14 Search vendor "Php" for product "Php" and version " >= 5.5.0 < 5.5.14" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 7.0 Search vendor "Debian" for product "Debian Linux" and version "7.0" | - |
Affected
| ||||||
Debian Search vendor "Debian" | Debian Linux Search vendor "Debian" for product "Debian Linux" | 8.0 Search vendor "Debian" for product "Debian Linux" and version "8.0" | - |
Affected
|