ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
[
{
"id": "CVE-2016-7125-457ca896",
"source": "https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce",
"digest": {
"length": 1163.0,
"function_hash": "107788997388467024839094674994353118451"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"target": {
"function": "PS_SERIALIZER_DECODE_FUNC",
"file": "ext/session/session.c"
}
},
{
"id": "CVE-2016-7125-a574bdc3",
"source": "https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce",
"digest": {
"line_hashes": [
"106887075294435159751258907670730008067",
"17824720681596088120189278330761514758",
"202896345813601310887623560120731495632",
"117052572558832084793886867158824318295",
"44558091930348656911918902179235958927",
"25689418931545254097413809414195322921",
"46291548331210342705707066555522636092",
"22405959284939623801867279044200194773",
"253349475471412221446371530273326942972",
"307987088346644050011362115553298844560",
"21849972807398295414146614750964103027",
"135091234369615819904298797774804809646",
"212587539786642919187065182908910175992",
"164147441189634810453409513976303397257",
"299762411656234981452921045448798488259",
"86363540910675021090373648322452023730",
"87124428916936756879781165876873233580",
"92888288879166682273108158547994072383",
"300292442740619851530068025798914404607",
"165538226259317472163581441656359149941",
"104203044083152032254150804362834268734",
"131556912046690260698768632303368932509",
"113633271068740106901875594896553919787",
"27278386797999691503366223039879666032",
"131461043665418090392346183123079504757",
"106887075294435159751258907670730008067",
"17824720681596088120189278330761514758",
"59145684528599394907719923743168088306",
"224343750237432897445522311831233044126",
"190492681665563352313897654540545552431",
"236937198641781685019627809877323116077",
"293714124336778393489331498732430608708",
"322569731665167814852020378719603476768",
"263351328584288244753338650312777852442",
"283764074968325309223946918645366847251",
"265328183363365076878376663474967488097",
"2902288216488715682764002233285881109",
"212587539786642919187065182908910175992",
"18567545397569729061884670908534903939",
"66557614463077134263858336184600495855",
"83677007198874543882106702068780462468",
"83313525255790333985243127477768377647",
"311598070549299744904677263406695738569",
"131556912046690260698768632303368932509",
"307869019885692082910704881025654852690",
"142355728702177090617247597022589729735",
"324272434018370530187044176789325173173"
],
"threshold": 0.9
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Line",
"target": {
"file": "ext/session/session.c"
}
},
{
"id": "CVE-2016-7125-a9504544",
"source": "https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce",
"digest": {
"length": 1107.0,
"function_hash": "146188824495324580359682585107774984024"
},
"signature_version": "v1",
"deprecated": false,
"signature_type": "Function",
"target": {
"function": "PS_SERIALIZER_DECODE_FUNC",
"file": "ext/session/session.c"
}
}
]