Lookup for vulnerable packages by Package URL.

Purlpkg:deb/debian/phpunit@3.2.16-1
Typedeb
Namespacedebian
Namephpunit
Version3.2.16-1
Qualifiers
Subpath
Is_vulnerabletrue
Next_non_vulnerable_version11.5.19-1+deb13u1
Latest_non_vulnerable_version11.5.19-1+deb13u1
Affected_by_vulnerabilities
0
url VCID-6bt7-kw89-v3dt
vulnerability_id VCID-6bt7-kw89-v3dt
summary
PHPUnit Vulnerable to Unsafe Deserialization in PHPT Code Coverage Handling
### Overview

A vulnerability has been discovered involving unsafe deserialization of code coverage data in PHPT test execution. The vulnerability exists in the `cleanupForCoverage()` method, which deserializes code coverage files without validation, potentially allowing remote code execution if malicious `.coverage` files are present prior to the execution of the PHPT test.

### Technical Details

**Affected Component:** PHPT test runner, method `cleanupForCoverage()`
**Affected Versions:** <= 8.5.51, <= 9.6.32, <= 10.5.61, <= 11.5.49, <= 12.5.7

### Vulnerable Code Pattern

```php
if ($buffer !== false) {
    // Unsafe call without restrictions
    $coverage = @unserialize($buffer);
}
```

The vulnerability occurs when a `.coverage` file, which should not exist before test execution, is deserialized without the `allowed_classes` parameter restriction. An attacker with local file write access can place a malicious serialized object with a `__wakeup()` method into the file system, leading to arbitrary code execution during test runs with code coverage instrumentation enabled.

### Attack Prerequisites and Constraints

This vulnerability requires **local file write access** to the location where PHPUnit stores or expects code coverage files for PHPT tests. This can occur through:

* **CI/CD Pipeline Attacks:** A malicious pull request that places a `.coverage` file alongside test files, executed when the CI system runs tests using PHPUnit and collects code coverage information
* **Local Development Environment:** An attacker with shell access or ability to write files to the project directory
* **Compromised Dependencies:** A supply chain attack inserting malicious files into a package or monorepo

**Critical Context:** Running test suites from unreviewed pull requests without isolated execution is inherently a code execution risk, independent of this specific vulnerability. This represents a broader class of [Poisoned Pipeline Execution (PPE) attacks](https://owasp.org/www-project-top-10-ci-cd-security-risks/CICD-SEC-04-Poisoned-Pipeline-Execution) affecting CI/CD systems.

### Proposed Remediation Approach

Rather than just silently sanitizing the input via `['allowed_classes' => false]`, the maintainer has chosen to make the anomalous state explicit by treating pre-existing `.coverage` files for PHPT tests as an error condition.

#### Rationale for Error-Based Approach:

1. **Visibility Over Silence:** When an invariant is violated (a `.coverage` file existing before test execution), the error must be visible in CI/CD output, alerting operators to investigate the root cause rather than proceeding with sanitized input
2. **Operational Security:** A `.coverage` file should never exist before tests run, coverage data is generated by executing tests, not sourced from artifacts. Its presence indicates:
    * A malicious actor placed it intentionally
    * Build artifacts from a previous run contaminated the environment
    * An unexpected filesystem state requiring investigation
3. **Defense-in-Depth Principle:** Protecting a single deserialization call does not address the fundamental attack surface. Proper mitigations for PPE attacks lie outside PHPUnit's scope:
    * Isolate CI/CD runners (ephemeral, containerized environments)
    * Restrict code execution on protected branches
    * Scan pull requests and artifacts for tampering
    * Use branch protection rules to prevent unreviewed code execution

### Severity Classification

* **Attack Vector (AV):** Local (L) — requires write access to the file system where tests execute
* **Attack Complexity (AC):** Low (L) — exploitation is straightforward once the malicious file is placed
* **Privileges Required (PR):** Low (L) — PR submitter status or contributor role provides sufficient access
* **User Interaction (UI):** None (N) — automatic execution during standard test execution
* **Scope (S):** Unchanged (U) — impact remains within the affected test execution context
* **Confidentiality Impact (C):** High (H) — full remote code execution enables complete system compromise
* **Integrity Impact (I):** High (H) — arbitrary code execution allows malicious modifications
* **Availability Impact (A):** High (H) — full code execution permits denial-of-service actions

### Mitigating Factors (Environmental Context)

Organizations can reduce the effective risk of this vulnerability through proper CI/CD configuration:

* **Ephemeral Runners:** Use containerized, single-use CI/CD runners that discard filesystem state between runs
* **Code Review Enforcement:** Require human review and approval before executing code from pull requests
* **Branch Protection:** Enforce branch protection rules that block unreviewed code execution
* **Artifact Isolation:** Separate build artifacts from source; never reuse artifacts across independent builds
* **Access Control:** Limit file write permissions in CI environments to authenticated, trusted actors

### Fixed Behaviour

When a `.coverage` file is detected for a PHPT test prior to execution, PHPUnit will emit a clear error message identifying the anomalous state. This ensures:

* **Visibility:** The error appears prominently in CI/CD output and test logs
* **Investigation:** Operations teams can investigate the root cause (potential tampering, environment contamination)
* **Fail-Fast Semantics:** Test execution stops rather than proceeding with an unexpected state

### Recommendation

**Update to the patched version immediately** if a project runs PHPT tests using PHPUnit with coverage instrumentation in any CI/CD environment that executes code from external contributors. Additionally, audit the project's CI/CD configuration to ensure:

* Pull requests from forks or untrusted sources execute in isolated environments
* Branch protection rules require human review before code execution
* CI/CD runners are ephemeral and discarded after each build
* Build artifacts are not reused across independent runs without validation
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24765.json
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-24765.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-24765
reference_id
reference_type
scores
0
value 0.00106
scoring_system epss
scoring_elements 0.28803
published_at 2026-04-02T12:55:00Z
1
value 0.00106
scoring_system epss
scoring_elements 0.28853
published_at 2026-04-04T12:55:00Z
2
value 0.00123
scoring_system epss
scoring_elements 0.31476
published_at 2026-04-16T12:55:00Z
3
value 0.00123
scoring_system epss
scoring_elements 0.31441
published_at 2026-04-13T12:55:00Z
4
value 0.00123
scoring_system epss
scoring_elements 0.31422
published_at 2026-04-21T12:55:00Z
5
value 0.00123
scoring_system epss
scoring_elements 0.31454
published_at 2026-04-18T12:55:00Z
6
value 0.00123
scoring_system epss
scoring_elements 0.31478
published_at 2026-04-12T12:55:00Z
7
value 0.00123
scoring_system epss
scoring_elements 0.3152
published_at 2026-04-11T12:55:00Z
8
value 0.00123
scoring_system epss
scoring_elements 0.31516
published_at 2026-04-09T12:55:00Z
9
value 0.00123
scoring_system epss
scoring_elements 0.31487
published_at 2026-04-08T12:55:00Z
10
value 0.00123
scoring_system epss
scoring_elements 0.31434
published_at 2026-04-07T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-24765
2
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24765
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2026-24765
3
reference_url https://github.com/sebastianbergmann/phpunit
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sebastianbergmann/phpunit
4
reference_url https://github.com/sebastianbergmann/phpunit/commit/3141742e00620e2968d3d2e732d320de76685fda
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-28T21:13:53Z/
url https://github.com/sebastianbergmann/phpunit/commit/3141742e00620e2968d3d2e732d320de76685fda
5
reference_url https://github.com/sebastianbergmann/phpunit/commit/613d142f5a8471ca71623ce5ca2795f79248329e
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/sebastianbergmann/phpunit/commit/613d142f5a8471ca71623ce5ca2795f79248329e
6
reference_url https://github.com/sebastianbergmann/phpunit/releases/tag/10.5.63
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-28T21:13:53Z/
url https://github.com/sebastianbergmann/phpunit/releases/tag/10.5.63
7
reference_url https://github.com/sebastianbergmann/phpunit/releases/tag/11.5.50
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-28T21:13:53Z/
url https://github.com/sebastianbergmann/phpunit/releases/tag/11.5.50
8
reference_url https://github.com/sebastianbergmann/phpunit/releases/tag/12.5.8
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-28T21:13:53Z/
url https://github.com/sebastianbergmann/phpunit/releases/tag/12.5.8
9
reference_url https://github.com/sebastianbergmann/phpunit/releases/tag/8.5.52
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-28T21:13:53Z/
url https://github.com/sebastianbergmann/phpunit/releases/tag/8.5.52
10
reference_url https://github.com/sebastianbergmann/phpunit/releases/tag/9.6.33
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-28T21:13:53Z/
url https://github.com/sebastianbergmann/phpunit/releases/tag/9.6.33
11
reference_url https://github.com/sebastianbergmann/phpunit/security/advisories/GHSA-vvj3-c3rp-c85p
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
2
value HIGH
scoring_system generic_textual
scoring_elements
3
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:T/P:M/B:A/M:M/D:T/2026-01-28T21:13:53Z/
url https://github.com/sebastianbergmann/phpunit/security/advisories/GHSA-vvj3-c3rp-c85p
12
reference_url https://lists.debian.org/debian-lts-announce/2026/02/msg00009.html
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://lists.debian.org/debian-lts-announce/2026/02/msg00009.html
13
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-24765
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-24765
14
reference_url https://owasp.org/www-project-top-10-ci-cd-security-risks/CICD-SEC-04-Poisoned-Pipeline-Execution
reference_id
reference_type
scores
0
value 7.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://owasp.org/www-project-top-10-ci-cd-security-risks/CICD-SEC-04-Poisoned-Pipeline-Execution
15
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2433606
reference_id 2433606
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2433606
16
reference_url https://github.com/advisories/GHSA-vvj3-c3rp-c85p
reference_id GHSA-vvj3-c3rp-c85p
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-vvj3-c3rp-c85p
fixed_packages
0
url pkg:deb/debian/phpunit@9.6.7-1
purl pkg:deb/debian/phpunit@9.6.7-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6bt7-kw89-v3dt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpunit@9.6.7-1
1
url pkg:deb/debian/phpunit@11.5.19-1%2Bdeb13u1
purl pkg:deb/debian/phpunit@11.5.19-1%2Bdeb13u1
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpunit@11.5.19-1%252Bdeb13u1
aliases CVE-2026-24765, GHSA-vvj3-c3rp-c85p
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-6bt7-kw89-v3dt
1
url VCID-ks7b-f17t-dfd4
vulnerability_id VCID-ks7b-f17t-dfd4
summary
Code Injection in PHPUnit
Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a `<?php ` substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
references
0
reference_url https://api.first.org/data/v1/epss?cve=CVE-2017-9841
reference_id
reference_type
scores
0
value 0.9421
scoring_system epss
scoring_elements 0.99923
published_at 2026-04-18T12:55:00Z
1
value 0.9421
scoring_system epss
scoring_elements 0.99922
published_at 2026-04-21T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2017-9841
1
reference_url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9841
reference_id
reference_type
scores
url https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9841
2
reference_url https://github.com/sebastianbergmann/phpunit
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/sebastianbergmann/phpunit
3
reference_url https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:09:44Z/
url https://github.com/sebastianbergmann/phpunit/commit/284a69fb88a2d0845d23f42974a583d8f59bf5a5
4
reference_url https://github.com/sebastianbergmann/phpunit/commit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/sebastianbergmann/phpunit/commit/3aaddb1c5bd9b9b8d070b4cf120e71c36fd08412
5
reference_url https://github.com/sebastianbergmann/phpunit/pull/1955
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/sebastianbergmann/phpunit/pull/1955
6
reference_url https://github.com/sebastianbergmann/phpunit/pull/1956
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:09:44Z/
url https://github.com/sebastianbergmann/phpunit/pull/1956
7
reference_url https://security.gentoo.org/glsa/201711-15
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:09:44Z/
url https://security.gentoo.org/glsa/201711-15
8
reference_url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-9841
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-9841
9
reference_url https://www.oracle.com/security-alerts/cpuoct2021.html
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:09:44Z/
url https://www.oracle.com/security-alerts/cpuoct2021.html
10
reference_url http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com
11
reference_url http://www.securityfocus.com/bid/101798
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:09:44Z/
url http://www.securityfocus.com/bid/101798
12
reference_url http://www.securitytracker.com/id/1039812
reference_id
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
2
value CRITICAL
scoring_system generic_textual
scoring_elements
3
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:09:44Z/
url http://www.securitytracker.com/id/1039812
13
reference_url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=866200
reference_id 866200
reference_type
scores
url https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=866200
14
reference_url https://security.archlinux.org/AVG-491
reference_id AVG-491
reference_type
scores
0
value Critical
scoring_system archlinux
scoring_elements
url https://security.archlinux.org/AVG-491
15
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/50702.py
reference_id CVE-2017-9841
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/php/webapps/50702.py
16
reference_url https://nvd.nist.gov/vuln/detail/CVE-2017-9841
reference_id CVE-2017-9841
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2017-9841
17
reference_url https://github.com/FriendsOfPHP/security-advisories/blob/master/phpunit/phpunit/CVE-2017-9841.yaml
reference_id CVE-2017-9841.YAML
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:H
1
value CRITICAL
scoring_system generic_textual
scoring_elements
url https://github.com/FriendsOfPHP/security-advisories/blob/master/phpunit/phpunit/CVE-2017-9841.yaml
18
reference_url https://github.com/advisories/GHSA-r7c9-c69m-rph8
reference_id GHSA-r7c9-c69m-rph8
reference_type
scores
0
value CRITICAL
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-r7c9-c69m-rph8
19
reference_url http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/
reference_id phpunit.vulnbusters.com
reference_type
scores
0
value 9.8
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
1
value Act
scoring_system ssvc
scoring_elements SSVCv2/E:A/A:Y/T:T/P:M/B:A/M:M/D:C/2025-02-07T14:09:44Z/
url http://web.archive.org/web/20170701212357/http://phpunit.vulnbusters.com/
20
reference_url https://usn.ubuntu.com/7171-1/
reference_id USN-7171-1
reference_type
scores
url https://usn.ubuntu.com/7171-1/
fixed_packages
0
url pkg:deb/debian/phpunit@7.5.6-1
purl pkg:deb/debian/phpunit@7.5.6-1
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-6bt7-kw89-v3dt
resource_url http://public2.vulnerablecode.io/packages/pkg:deb/debian/phpunit@7.5.6-1
aliases CVE-2017-9841, GHSA-r7c9-c69m-rph8
risk_score 10.0
exploitability 2.0
weighted_severity 9.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ks7b-f17t-dfd4
Fixing_vulnerabilities
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:deb/debian/phpunit@3.2.16-1