Description
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
Remediation
References
Related Vulnerabilities
WordPress Plugin Visualizer:Tables and Charts Manager for WordPress PHAR Deserialization (3.7.9)
WordPress Plugin WordPress Photo Gallery by Gallery Bank SQL Injection (3.0.101)
PHP Resource Management Errors Vulnerability (CVE-2010-2225)
Joomla! Core 3.x.x Security Bypass (3.1.0 - 3.8.12)
WordPress Plugin WP-Filebase Download Manager Cross-Site Scripting (3.4.4)