Vulnerability Description
The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 7.0.0 |
References
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=6aeee47b2cd47915ccfa3b41433a3f5
- http://www.openwall.com/lists/oss-security/2015/07/30/11Mailing ListThird Party Advisory
- https://bugs.php.net/bug.php?id=70140ExploitIssue TrackingVendor Advisory
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=6aeee47b2cd47915ccfa3b41433a3f5
- http://www.openwall.com/lists/oss-security/2015/07/30/11Mailing ListThird Party Advisory
- https://bugs.php.net/bug.php?id=70140ExploitIssue TrackingVendor Advisory
FAQ
What is CVE-2015-6527?
CVE-2015-6527 is a vulnerability with a CVSS score of 7.3 (HIGH). The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace...
How severe is CVE-2015-6527?
CVE-2015-6527 has been rated HIGH with a CVSS base score of 7.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-6527?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.