GHSA-xxv8-pv43-57x5

Suggest an improvement
Source
https://github.com/advisories/GHSA-xxv8-pv43-57x5
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-xxv8-pv43-57x5/GHSA-xxv8-pv43-57x5.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-xxv8-pv43-57x5
Aliases
Published
2022-05-13T01:28:45Z
Modified
2023-11-08T03:59:22.059808Z
Severity
  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N CVSS Calculator
Summary
PEAR core file overwrite vulnerability
Details

PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.

Database specific
{
    "nvd_published_at": "2017-02-01T23:59:00Z",
    "cwe_ids": [
        "CWE-74"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-07-07T20:58:05Z"
}
References

Affected packages

Packagist / pear/pear

Package

Name
pear/pear
Purl
pkg:composer/pear/pear

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Last affected
1.10.1