CVE-2016-7125

Priority
Description
ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips
invalid session names in a way that triggers incorrect parsing, which
allows remote attackers to inject arbitrary-type session data by leveraging
control of a session name, as demonstrated by object injection.
Assigned-to
mdeslaur
Package
Source: php5 (LP Ubuntu Debian)
Upstream:released (5.6.25)
Ubuntu 14.04 LTS (Trusty Tahr):released (5.5.9+dfsg-1ubuntu4.20)
Ubuntu 16.04 LTS (Xenial Xerus):DNE
Patches:
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=8763c6090d627d8bb0ee1d030c30e58f406be9ce
Upstream:http://git.php.net/?p=php-src.git;a=commit;h=b172f43caa048861899e78eb56607cb5b60e5cfb
More Information

Updated: 2018-10-31 21:24:22 UTC (commit cfa7cf69d76449ccff972ac22f40976a08d908c2)