Vulnerability Description
The SplFileInfo::getType function in the Standard PHP Library (SPL) extension in PHP before 5.3.4 on Windows does not properly detect symbolic links, which might make it easier for local users to conduct symlink attacks by leveraging cross-platform differences in the stat structure, related to lack of a FILE_ATTRIBUTE_REPARSE_POINT check.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | <= 5.3.3 |
| Microsoft | Windows | All versions |
Related Weaknesses (CWE)
References
- http://bugs.php.net/51763
- http://www.php.net/ChangeLog-5.php
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65429
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://bugs.php.net/51763
- http://www.php.net/ChangeLog-5.php
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65429
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2011-0754?
CVE-2011-0754 is a vulnerability with a CVSS score of 4.4 (MEDIUM). The SplFileInfo::getType function in the Standard PHP Library (SPL) extension in PHP before 5.3.4 on Windows does not properly detect symbolic links, which might make it easier for local users to cond...
How severe is CVE-2011-0754?
CVE-2011-0754 has been rated MEDIUM with a CVSS base score of 4.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0754?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php, Microsoft Windows.