Home / Vulnerability Database / PHP : Unsafe reflection
PHP

PHP : Unsafe reflection

Classification

OWASP Top 10 2013
OWASP Top 10 2017
OWASP Top 10 2021
PCI DSS 4.0

Overview

Insecure use of reflection: it is possible to execute arbitrary malicious code.

The method that implements reflection takes data from an untrusted source as an argument. This allows an attacker to control the application control flow graph, as well as to bypass authentication mechanisms and access restrictions.

The situation becomes especially dangerous if, in addition to the described vulnerability, an attacker can upload files into a directory that is present in the application’s classpath or edit the classpath. In this case, he/she can add arbitrary malicious code to the application and execute it.

MEDIUM

DerScanner Severity Score

Do you want to fix PHP : Unsafe reflection in your application?

See also

PHP

PHP : Null salt

PHP

PHP : Empty password

PHP

PHP : Empty salt