Code Injection in PHPUnit
Critical severity
GitHub Reviewed
Published
Mar 26, 2022
to the GitHub Advisory Database
•
Updated Feb 7, 2024
Package
Affected versions
>= 4.8.19, < 4.8.28
>= 5.0.10, < 5.6.3
Patched versions
4.8.28
5.6.3
Description
Published by the National Vulnerability Database
Jun 27, 2017
Published to the GitHub Advisory Database
Mar 26, 2022
Reviewed
Mar 26, 2022
Last updated
Feb 7, 2024
Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a
<?php
substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.References