5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0.006 Low
EPSS
Percentile
78.1%
ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips
invalid session names in a way that triggers incorrect parsing, which
allows remote attackers to inject arbitrary-type session data by leveraging
control of a session name, as demonstrated by object injection.
php.net/ChangeLog-5.php#5.6.25
php.net/ChangeLog-7.php#7.0.10
www.openwall.com/lists/oss-security/2016/09/02/5
launchpad.net/bugs/cve/CVE-2016-7125
nvd.nist.gov/vuln/detail/CVE-2016-7125
security-tracker.debian.org/tracker/CVE-2016-7125
ubuntu.com/security/notices/USN-3095-1
www.cve.org/CVERecord?id=CVE-2016-7125
5 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0.006 Low
EPSS
Percentile
78.1%