Date: Thu, 30 Jul 2015 13:16:38 +0200 From: Fourny Dimitri <fourny.d@...il.com> To: oss-security@...ts.openwall.com Subject: CVE Request: PHP v7 - Code execution vulnerability Hello, An arbitrary code execution is possible in the function str_ireplace() with PHP 7. The vulnerability is in the function php_string_tolower(). Patch: http://git.php.net/?p=php-src.git;a=commit;h=6aeee47b2cd47915ccfa3b41433a3f57aea24dd5 Report: https://bugs.php.net/bug.php?id=70140 Could you please assign a CVE for this vulnerability? Thank you. Regards, Dimitri Fourny.
Powered by blists - more mailing lists
Please check out the Open Source Software Security Wiki, which is counterpart to this mailing list.
Powered by Openwall GNU/*/Linux - Powered by OpenVZ