CVE-2016-7061

Source
https://cve.org/CVERecord?id=CVE-2016-7061
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7061.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2016-7061
Downstream
Published
2018-09-10T16:29:00.667Z
Modified
2026-02-22T01:10:27.151050Z
Severity
  • 6.5 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N CVSS Calculator
Summary
[none]
Details

An information disclosure vulnerability was found in JBoss Enterprise Application Platform before 7.0.4. It was discovered that when configuring RBAC and marking information as sensitive, users with a Monitor role are able to view the sensitive information.

References

Affected packages

Git / github.com/php/php-src

Affected ranges

Type
GIT
Repo
https://github.com/php/php-src
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

Other
NEWS
NEWS-cvs2svn
POST_64BIT_BRANCH_MERGE
POST_AST_MERGE
POST_NATIVE_TLS_MERGE
POST_PHP7_EREG_MYSQL_REMOVALS
POST_PHP7_NSAPI_REMOVAL
POST_PHP7_REMOVALS
POST_PHPNG_MERGE
PRE_64BIT_BRANCH_MERGE
PRE_AST_MERGE
PRE_NATIVE_TLS_MERGE
PRE_PHP7_EREG_MYSQL_REMOVALS
PRE_PHP7_NSAPI_REMOVAL
PRE_PHP7_REMOVALS
PRE_PHPNG_MERGE
php-5.*
php-5.3.23RC1
php-5.3.29
php-5.3.29RC1
php-5.4.30RC1
php-5.4.32RC1
php-5.4.4RC2
php-5.5.24RC1
php-5.6.18RC1
php-5.6.19RC1
php-7.*
php-7.0.3RC1
php-7.0.4RC1

Database specific

vanir_signatures
[
    {
        "source": "https://github.com/php/php-src/commit/e09845d32614a19188632f410316478fbb440ebd",
        "deprecated": false,
        "signature_type": "Function",
        "target": {
            "file": "ext/wddx/wddx.c",
            "function": "php_wddx_pop_element"
        },
        "digest": {
            "length": 3105.0,
            "function_hash": "256499925868157450184250045566717426855"
        },
        "signature_version": "v1",
        "id": "CVE-2016-7061-168acc40"
    },
    {
        "source": "https://github.com/php/php-src/commit/e09845d32614a19188632f410316478fbb440ebd",
        "deprecated": false,
        "signature_type": "Function",
        "target": {
            "file": "ext/wddx/wddx.c",
            "function": "php_wddx_process_data"
        },
        "digest": {
            "length": 1454.0,
            "function_hash": "297808210448008143422161856745228178213"
        },
        "signature_version": "v1",
        "id": "CVE-2016-7061-63916535"
    },
    {
        "source": "https://github.com/php/php-src/commit/e09845d32614a19188632f410316478fbb440ebd",
        "deprecated": false,
        "signature_type": "Line",
        "target": {
            "file": "ext/wddx/wddx.c"
        },
        "digest": {
            "threshold": 0.9,
            "line_hashes": [
                "240350071091354082169554641503322018360",
                "83239604679707749811593051196119658386",
                "227586690061435287287994965536507444467",
                "171971468238865359835315510260595594604",
                "34110307404906790365435565495275501781",
                "37364056837223290377158685987933560788",
                "158805433901848107125099228832282898903",
                "154096422045862655651765972076311404641"
            ]
        },
        "signature_version": "v1",
        "id": "CVE-2016-7061-f1f44522"
    }
]
source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2016-7061.json"