Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2005-3390

Опубликовано: 01 нояб. 2005
Источник: debian
EPSS Средний

Описание

The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php4fixed4:4.4.2-1package
php5fixed5.1.1-1package
php4no-dsasargepackage

Примечания

  • http://www.hardened-php.net/advisory_202005.79.html

  • http://www.hardened-php.net/globals-problem

EPSS

Процентиль: 98%
0.59549
Средний

Связанные уязвимости

ubuntu
больше 19 лет назад

The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field.

redhat
больше 19 лет назад

The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field.

nvd
больше 19 лет назад

The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field.

github
около 3 лет назад

The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote attackers to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field.

EPSS

Процентиль: 98%
0.59549
Средний