Description
phpWhois allows remote attackers to execute arbitrary code via a crafted whois record.
References (6)
Core 6
Core References
Issue Tracking, Third Party Advisory x_refsource_confirm
https://github.com/jsmitty12/phpWhois/issues/19
Exploit, Third Party Advisory x_refsource_misc
https://github.com/sbaresearch/advisories/tree/public/2018/SBA-ADV-20180425-01_phpWhois_Code_Execution
Patch, Vendor Advisory x_refsource_confirm
https://github.com/sparc/phpWhois.org/commit/5cc572490c9053d46598ec9348a11e36a5a33a46#diff-f150ae17da7341bf6c2eff928684b3a3
Patch, Third Party Advisory x_refsource_confirm
https://github.com/Gemorroj/phpwhois/commit/91c937e03c876ba1290b6de2a3ad953d2105fdd0
Third Party Advisory x_refsource_misc
https://blog.nettitude.com/uk/cve-2015-5243-phpwhois-remote-code-execution
Release Notes, Third Party Advisory x_refsource_confirm
https://github.com/jsmitty12/phpWhois/blob/master/CHANGELOG.md
Scores
CVSS v3
9.8
EPSS
0.1111
EPSS Percentile
93.5%
Attack Vector
NETWORK
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-94
Status
published
Products (10)
brightlocal/phpwhois
0Packagist
david-garcia/phpwhois
0Packagist
ivankristianto/phpwhois
0Packagist
jsmitty12/phpwhois
0 - 5.1.0Packagist
kazist/phpwhois
0Packagist
phpwhois/phpwhois
0Packagist
phpwhois_project/phpwhois
< 4.2.2
serluck/phpwhois
0Packagist
simple-updates/phpwhois
0Packagist
truckersmp/phpwhois
0Packagist
Published
Aug 20, 2018
Tracked Since
Feb 18, 2026