脆弱性情報
高度な大規模言語モデル技術を使用していますが、出力には不正確または古い情報が含まれる可能性があります。Shenlongはデータの正確性を確保するよう努めていますが、実際の状況に基づいて検証・判断してください。
脆弱性タイトル
PHPUnit: Argument injection via newline in PHP INI values forwarded to child processes
脆弱性説明
PHPUnit is a testing framework for PHP. In versions 12.5.21 and 13.1.5, PHPUnit forwards PHP INI settings to child processes (used for isolated/PHPT test execution) as -d name=value command-line arguments without neutralizing INI metacharacters. Because PHP's INI parser interprets " as a string delimiter, ; as the start of a comment, and most importantly a newline as a directive separator, a value containing a newline is parsed by the child process as multiple INI directives. An attacker able to influence a single INI value can therefore inject arbitrary additional directives into the child's configuration, including auto_prepend_file, extension, disable_functions, open_basedir, and others. Setting auto_prepend_file to an attacker-controlled path yields remote code execution in the child process. This issue has been patched in versions 12.5.22 and 13.1.6.
CVSS情報
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
脆弱性タイプ
对CRLF序列的转义处理不恰当(CRLF注入)
脆弱性タイトル
PHPUnit 参数注入漏洞
脆弱性説明
PHPUnit是Sebastian Bergmann个人开发者的一个PHP单元测试框架。 PHPUnit 12.5.21版本和13.1.5版本存在参数注入漏洞,该漏洞源于将PHP INI设置转发给子进程时未中和INI元字符,可能导致远程代码执行。
CVSS情報
N/A
脆弱性タイプ
N/A