cve/2017/CVE-2017-11628.md

18 lines
919 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2017-11628](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-11628)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
In PHP before 5.6.31, 7.x before 7.0.21, and 7.1.x before 7.1.7, a stack-based buffer overflow in the zend_ini_do_op() function in Zend/zend_ini_parser.c could cause a denial of service or potentially allow executing code. NOTE: this is only relevant for PHP applications that accept untrusted input (instead of the system's php.ini file) for the parse_ini_string or parse_ini_file function, e.g., a web application for syntax validation of php.ini directives.
### POC
#### Reference
- https://hackerone.com/reports/248601
#### Github
No PoCs found on GitHub currently.