ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2016-09-12T01:00:00
Updated: 2018-01-04T19:57:01
Reserved: 2016-09-02T00:00:00
Link: CVE-2016-7125
JSON object: View
NVD Information
Status : Modified
Published: 2016-09-12T01:59:03.427
Modified: 2018-01-05T02:31:12.337
Link: CVE-2016-7125
JSON object: View
Redhat Information
No data.
CWE