Util/PHP/eval-stdin.php in PHPUnit before 4.8.28 and 5.x before 5.6.3 allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a "<?php " substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
2017-06-27T17:29:00.177
2025-04-20T01:37:25.860
Deferred
CVSSv3.1: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:P/A:P
10.0
6.4
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | phpunit_project | phpunit | ≤ 4.8.27 | Yes |
Application | phpunit_project | phpunit | < 5.6.3 | Yes |
Application | oracle | communications_diameter_signaling_router | ≤ 8.5.0 | Yes |