The php_str_replace_in_subject function in ext/standard/string.c in PHP 7.x before 7.0.0 allows remote attackers to execute arbitrary code via a crafted value in the third argument to the str_ireplace function.
2016-01-19T05:59:01.327
2025-04-12T10:46:40.837
Deferred
CVSSv3.1: 7.3 (HIGH)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |
Application | php | php | 7.0.0 | Yes |