Vulnerability Description
Eval injection vulnerability in php-gettext 1.0.12 and earlier allows remote attackers to execute arbitrary PHP code via a crafted plural forms header.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php-Gettext Project | Php-Gettext | <= 1.0.12 |
Related Weaknesses (CWE)
References
- https://bugs.launchpad.net/php-gettext/+bug/1606184
- https://github.com/NagVis/nagvis/commit/4fe8672a5aec3467da72b5852ca6d283c15adb53
- https://kmkz-web-blog.blogspot.cz/2016/07/advisory-cve-2016-6175.html
- https://www.exploit-db.com/exploits/40154/
- https://bugs.launchpad.net/php-gettext/+bug/1606184
- https://github.com/NagVis/nagvis/commit/4fe8672a5aec3467da72b5852ca6d283c15adb53
- https://kmkz-web-blog.blogspot.cz/2016/07/advisory-cve-2016-6175.html
- https://www.exploit-db.com/exploits/40154/
FAQ
What is CVE-2016-6175?
CVE-2016-6175 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Eval injection vulnerability in php-gettext 1.0.12 and earlier allows remote attackers to execute arbitrary PHP code via a crafted plural forms header.
How severe is CVE-2016-6175?
CVE-2016-6175 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2016-6175?
Check the references section above for vendor advisories and patch information. Affected products include: Php-Gettext Project Php-Gettext.