Files
CVEs-PoC/2014/CVE-2014-8142.md
T
2024-06-18 02:51:15 +02:00

23 lines
1.2 KiB
Markdown

### [CVE-2014-8142](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-8142)
![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen)
### Description
Use-after-free vulnerability in the process_nested_data function in ext/standard/var_unserializer.re in PHP before 5.4.36, 5.5.x before 5.5.20, and 5.6.x before 5.6.4 allows remote attackers to execute arbitrary code via a crafted unserialize call that leverages improper handling of duplicate keys within the serialized properties of an object, a different vulnerability than CVE-2004-1019.
### POC
#### Reference
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- https://bugs.php.net/bug.php?id=68594
#### Github
- https://github.com/3xp10it/php_cve-2014-8142_cve-2015-0231
- https://github.com/NetW0rK1le3r/awesome-hacking-lists
- https://github.com/readloud/Awesome-Stars
- https://github.com/xbl2022/awesome-hacking-lists