CVE-2017-5677
Published Feb 6, 2017
Last updated 5 years ago
Overview
- Description
- PEAR HTML_AJAX 0.3.0 through 0.5.7 has a PHP Object Injection Vulnerability in the PHP Serializer. It allows remote code execution. In one viewpoint, the root cause is an incorrect regular expression.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:pear:html_ajax:0.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44363911-DB3D-43B0-B9DF-5FB2F0CE9608" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38F890FC-31D3-4441-8B8D-86A84EC77EE6" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C33E7BFE-5F77-4329-B562-C4FE0B51E192" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.3.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "33741A5B-EF7E-4491-A498-ECCB7BF71C67" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.3.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F495C13-4A7E-41B1-984B-D337C4902D21" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9CDE9746-0B92-4EFD-9D8A-4C0188CC718C" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A1F9178-43B1-4A7B-AF47-6960B524A5D5" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57FFFA78-4AEF-4DD3-BB13-BC1D665AC599" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC0DCF82-839A-45FA-9CA5-E67783B76BBB" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "02C418F9-4DBB-413D-9096-2615E3924E29" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "855A68CC-20BE-43B4-8A6C-4712AE4D679B" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.5.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4CB125CD-0C86-4E10-91B2-534EFF2E773B" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.5.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E105D250-2808-47B6-B8E2-63E0A325CFB0" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.5.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4A0F0836-28AA-4E53-A579-A31B30A2A00A" }, { "criteria": "cpe:2.3:a:pear:html_ajax:0.5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F21140B8-BF43-494D-95C2-75F4AACB1DE0" } ], "operator": "OR" } ] } ]