ext/session/session.c in PHP before 5.6.25 and 7.x before 7.0.10 skips invalid session names in a way that triggers incorrect parsing, which allows remote attackers to inject arbitrary-type session data by leveraging control of a session name, as demonstrated by object injection.
{ "vanir_signatures": [ { "deprecated": false, "signature_type": "Function", "id": "CVE-2016-7125-457ca896", "target": { "function": "PS_SERIALIZER_DECODE_FUNC", "file": "ext/session/session.c" }, "signature_version": "v1", "digest": { "length": 1163.0, "function_hash": "107788997388467024839094674994353118451" }, "source": "https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce" }, { "deprecated": false, "signature_type": "Line", "id": "CVE-2016-7125-a574bdc3", "target": { "file": "ext/session/session.c" }, "signature_version": "v1", "digest": { "threshold": 0.9, "line_hashes": [ "106887075294435159751258907670730008067", "17824720681596088120189278330761514758", "202896345813601310887623560120731495632", "117052572558832084793886867158824318295", "44558091930348656911918902179235958927", "25689418931545254097413809414195322921", "46291548331210342705707066555522636092", "22405959284939623801867279044200194773", "253349475471412221446371530273326942972", "307987088346644050011362115553298844560", "21849972807398295414146614750964103027", "135091234369615819904298797774804809646", "212587539786642919187065182908910175992", "164147441189634810453409513976303397257", "299762411656234981452921045448798488259", "86363540910675021090373648322452023730", "87124428916936756879781165876873233580", "92888288879166682273108158547994072383", "300292442740619851530068025798914404607", "165538226259317472163581441656359149941", "104203044083152032254150804362834268734", "131556912046690260698768632303368932509", "113633271068740106901875594896553919787", "27278386797999691503366223039879666032", "131461043665418090392346183123079504757", "106887075294435159751258907670730008067", "17824720681596088120189278330761514758", "59145684528599394907719923743168088306", "224343750237432897445522311831233044126", "190492681665563352313897654540545552431", "236937198641781685019627809877323116077", "293714124336778393489331498732430608708", "322569731665167814852020378719603476768", "263351328584288244753338650312777852442", "283764074968325309223946918645366847251", "265328183363365076878376663474967488097", "2902288216488715682764002233285881109", "212587539786642919187065182908910175992", "18567545397569729061884670908534903939", "66557614463077134263858336184600495855", "83677007198874543882106702068780462468", "83313525255790333985243127477768377647", "311598070549299744904677263406695738569", "131556912046690260698768632303368932509", "307869019885692082910704881025654852690", "142355728702177090617247597022589729735", "324272434018370530187044176789325173173" ] }, "source": "https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce" }, { "deprecated": false, "signature_type": "Function", "id": "CVE-2016-7125-a9504544", "target": { "function": "PS_SERIALIZER_DECODE_FUNC", "file": "ext/session/session.c" }, "signature_version": "v1", "digest": { "length": 1107.0, "function_hash": "146188824495324580359682585107774984024" }, "source": "https://github.com/php/php-src/commit/8763c6090d627d8bb0ee1d030c30e58f406be9ce" } ] }