FreeBSD VuXML: Documenting security issues in FreeBSD and the FreeBSD Ports Collection

php5 -- Multiple vulnerabilities

Affected packages
php5 < 5.4.13
php53 < 5.3.23

Details

VuXML ID 1d23109a-9005-11e2-9602-d43d7e0c7c02
Discovery 2013-03-04
Entry 2013-03-18

The PHP development team reports:

PHP does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.

The SOAP parser in PHP allows remote attackers to read arbitrary files via a SOAP WSDL file containing an XML external entity declaration in conjunction with an entity reference, related to an XML External Entity (XXE) issue in the soap_xmlParseFile and soap_xmlParseMemory functions.

References

CVE Name CVE-2013-1635
CVE Name CVE-2013-1643