CVE-2015-10141

NameCVE-2015-10141
DescriptionAn unauthenticated OS command injection vulnerability exists within Xdebug versions 2.5.5 and earlier, a PHP debugging extension developed by Derick Rethans. When remote debugging is enabled, Xdebug listens on port 9000 and accepts debugger protocol commands without authentication. An attacker can send a crafted eval command over this interface to execute arbitrary PHP code, which may invoke system-level functions such as system() or passthru(). This results in full compromise of the host under the privileges of the web server user.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
xdebug (PTS)bullseye3.0.2+2.9.8+2.8.1+2.5.5-2vulnerable
bookworm3.2.0+3.1.6+2.9.8+2.8.1+2.5.5-3vulnerable
forky, sid, trixie3.4.5-3vulnerable

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
xdebugsource(unstable)(unfixed)unimportant

Notes

https://kirtixs.com/blog/2015/11/13/xpwn-exploiting-xdebug-enabled-servers/
https://web.archive.org/web/20231226215418/https://paper.seebug.org/397/
https://www.exploit-db.com/exploits/44568
https://phpc.social/@derickr/114964060410165778
Only an issue if xdebug is remotely in untrusted networks exposed withouth
taking documented restricting options.

Search for package or bug name: Reporting problems