Ecosyste.ms: Advisories
An open API service providing security vulnerability metadata for many open source software ecosystems.
Security Advisories: GSA_kwCzR0hTQS14eHY4LXB2NDMtNTd4Nc4AAQtZ
PEAR core file overwrite vulnerability
PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.
Permalink: https://github.com/advisories/GHSA-xxv8-pv43-57x5JSON: https://advisories.ecosyste.ms/api/v1/advisories/GSA_kwCzR0hTQS14eHY4LXB2NDMtNTd4Nc4AAQtZ
Source: GitHub Advisory Database
Origin: Unspecified
Severity: High
Classification: General
Published: over 1 year ago
Updated: 3 months ago
CVSS Score: 7.5
CVSS vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Identifiers: GHSA-xxv8-pv43-57x5, CVE-2017-5630
References:
- https://nvd.nist.gov/vuln/detail/CVE-2017-5630
- https://www.exploit-db.com/exploits/41185/
- http://pear.php.net/bugs/bug.php?id=21171
- https://vimeo.com/201341280
- https://web.archive.org/web/20210123222048/https://www.securityfocus.com/bid/95882/
- http://hyp3rlinx.altervista.org/advisories/PEAR-ARBITRARY-FILE-DOWNLOAD.txt
- https://github.com/advisories/GHSA-xxv8-pv43-57x5
Affected Packages
packagist:pear/pear
Versions: <= 1.10.1No known fixed version