PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
Publish Date : 2011-01-18 Last Update Date : 2018-10-30
Title |
Definition Id |
Class |
Family |
DEPRECATED: ELSA-2013-1307 -- php53 security, bug fix and enhancement update (moderate) |
oval:org.mitre.oval:def:27418 |
|
unix |
DEPRECATED: ELSA-2014-0311 -- php security update (critical) |
oval:org.mitre.oval:def:27015 |
|
unix |
ELSA-2013-1615 -- php security, bug fix, and enhancement update (moderate) |
oval:org.mitre.oval:def:27442 |
|
unix |
ELSA-2013:1307: php53 security, bug fix and enhancement update (Moderate) |
oval:org.mitre.oval:def:23222 |
|
unix |
ELSA-2014:0311: php security update (Critical) |
oval:org.mitre.oval:def:23947 |
|
unix |
HP-UX Apache Running Tomcat Servlet Engine, Remote Denial of Service (DoS), Access Restriction Bypass |
oval:org.mitre.oval:def:19494 |
|
unix |
NULL byte injection vulnerability in PHP before 5.3.4 |
oval:org.mitre.oval:def:12569 |
|
windows |
RHSA-2013:1307: php53 security, bug fix and enhancement update (Moderate) |
oval:org.mitre.oval:def:21114 |
|
unix |
RHSA-2013:1307: php53 security, bug fix and enhancement update (Moderate) |
oval:com.redhat.rhsa:def:20131307 |
|
unix |
RHSA-2013:1615 -- php security, bug fix, and enhancement update (Moderate) |
oval:org.mitre.oval:def:27044 |
|
unix |
RHSA-2013:1615: php security, bug fix, and enhancement update (Moderate) |
oval:com.redhat.rhsa:def:20131615 |
|
unix |
RHSA-2014:0311: php security update (Critical) |
oval:org.mitre.oval:def:24079 |
|
unix |
RHSA-2014:0311: php security update (Critical) |
oval:com.redhat.rhsa:def:20140311 |
|
unix |
|
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify
a vulnerability or a missing patch. Check out the OVAL definitions
if you want to learn what you should do to verify a vulnerability.