Unrated severityNVD Advisory· Published Jul 6, 2014· Updated May 6, 2026
CVE-2014-4721
CVE-2014-4721
Description
The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.
Affected products
3cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
14- www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.htmlnvdExploitThird Party Advisory
- lists.opensuse.org/opensuse-updates/2014-07/msg00035.htmlnvdMailing ListThird Party Advisory
- lists.opensuse.org/opensuse-updates/2014-09/msg00046.htmlnvdMailing ListThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1765.htmlnvdThird Party Advisory
- rhn.redhat.com/errata/RHSA-2014-1766.htmlnvdThird Party Advisory
- twitter.com/mikispag/statuses/485713462258302976nvdThird Party Advisory
- www-01.ibm.com/support/docview.wssnvdThird Party Advisory
- www.debian.org/security/2014/dsa-2974nvdThird Party Advisory
- www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.htmlnvdThird Party Advisory
- www.php.net/ChangeLog-5.phpnvdVendor Advisory
- bugs.php.net/bug.phpnvdVendor Advisory
- secunia.com/advisories/54553nvdBroken Link
- secunia.com/advisories/59794nvdBroken Link
- secunia.com/advisories/59831nvdBroken Link
News mentions
0No linked articles in our index yet.