Vulnerability Description
The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | >= 5.3.0, < 5.3.29 |
| Debian | Debian Linux | 7.0 |
Related Weaknesses (CWE)
References
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.htmlMailing ListThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00046.htmlMailing ListThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2014-1765.htmlThird Party Advisory
- http://rhn.redhat.com/errata/RHSA-2014-1766.htmlThird Party Advisory
- http://secunia.com/advisories/54553Broken Link
- http://secunia.com/advisories/59794Broken Link
- http://secunia.com/advisories/59831Broken Link
- http://twitter.com/mikispag/statuses/485713462258302976Third Party Advisory
- http://www-01.ibm.com/support/docview.wss?uid=swg21683486Third Party Advisory
- http://www.debian.org/security/2014/dsa-2974Third Party Advisory
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.htmlThird Party Advisory
- http://www.php.net/ChangeLog-5.phpVendor Advisory
- https://bugs.php.net/bug.php?id=67498Vendor Advisory
- https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.htmlExploitThird Party Advisory
- http://lists.opensuse.org/opensuse-updates/2014-07/msg00035.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2014-4721?
CVE-2014-4721 is a vulnerability with a CVSS score of 2.6 (LOW). The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SE...
How severe is CVE-2014-4721?
CVE-2014-4721 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-4721?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php, Debian Debian Linux.