CVE-2018-5712

Scores

EPSS

0.892high89.2%
0%20%40%60%80%100%

Percentile: 89.2%

CVSS

6.1medium3.x
0246810

CVSS Score: 6.1/10

All CVSS Scores

CVSS 3.x
6.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

CVSS 2.0
4.3

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Description

An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-79

Related Vulnerabilities

Vulnerable Software (21)

Type: Configuration

Product: php

Operating System: rhel 7

Trait:
{  "fixed": "5.4.16-48.el7"}

Source: redhat

Type: Configuration

Product: php5

Operating System: ubuntu trusty 14.04

Trait:
{  "fixed": "5.5.9+dfsg-1ubuntu4.23"}

Source: ubuntu

Type: Configuration

Product: php5

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Product: php7.0

Operating System: ubuntu xenial 16.04

Trait:
{  "fixed": "7.0.28-0ubuntu0.16.04.1"}

Source: ubuntu

Type: Configuration

Product: php7.0

Operating System: debian

Trait:
{  "fixed": "7.0.27-1"}

Source: debian

Type: Configuration

Product: php7.1

Operating System: ubuntu artful 17.10

Trait:
{  "fixed": "7.1.15-0ubuntu0.17.10.1"}

Source: ubuntu

Type: Configuration

Product: php7.1

Operating System: debian

Trait:
{  "fixed": "7.1.13-1"}

Source: debian

Type: Configuration

Product: php7.2

Operating System: ubuntu bionic 18.04

Trait:
{  "unaffected": true}

Source: ubuntu

Type: Configuration

Product: rh-php70-php

Operating System: rhel

Trait:
{  "fixed": "7.0.27-1.el6"}

Source: redhat

Type: Configuration

Product: rh-php70-php

Operating System: rhel

Trait:
{  "fixed": "7.0.27-1.el6"}

Source: redhat

Type: Configuration

Product: rh-php70-php

Operating System: rhel

Trait:
{  "fixed": "7.0.27-1.el7"}

Source: redhat

Type: Configuration

Product: rh-php70-php

Operating System: rhel

Trait:
{  "fixed": "7.0.27-1.el7"}

Source: redhat

Type: Configuration

Product: rh-php70-php

Operating System: rhel

Trait:
{  "fixed": "7.0.27-1.el7"}

Source: redhat

Type: Configuration

Product: rh-php70-php

Operating System: rhel

Trait:
{  "fixed": "7.0.27-1.el7"}

Source: redhat

Type: Configuration

Product: rh-php71-php

Operating System: rhel

Trait:
{  "fixed": "7.1.30-1.el7"}

Source: redhat

Type: Configuration

Product: rh-php71-php

Operating System: rhel

Trait:
{  "fixed": "7.1.30-1.el7"}

Source: redhat

Type: Configuration

Product: rh-php71-php

Operating System: rhel

Trait:
{  "fixed": "7.1.30-1.el7"}

Source: redhat

Type: Configuration

Product: rh-php71-php

Operating System: rhel

Trait:
{  "fixed": "7.1.30-1.el7"}

Source: redhat

Type: Configuration

Vendor: *

Product: debian_linux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*",      "vulnerable": true    }  ],  "operator": "OR"}

Source: nvd

Type: Configuration

Vendor: *

Product: php

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",      "versionEndIncluding": "5.6.32",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:php:php:*:*:*:...

Source: nvd