Util/PHP/eval-stdin.php in PHPUnit starting with 4.8.19 and before 4.8.28, as well as 5.x before 5.6.3, allows remote attackers to execute arbitrary PHP code via HTTP POST data beginning with a <?php substring, as demonstrated by an attack on a site with an exposed /vendor folder, i.e., external access to the /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php URI.
{
"github_reviewed": true,
"severity": "CRITICAL",
"nvd_published_at": "2017-06-27T17:29:00Z",
"github_reviewed_at": "2022-03-26T00:19:30Z",
"cwe_ids": [
"CWE-94"
]
}