Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2006-7243

Опубликовано: 18 янв. 2011
Источник: debian
EPSS Низкий

Описание

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5fixed5.3.3-6package

Примечания

  • old, known, issue -- partial protection by the suhosin extension

  • http://svn.php.net/viewvc?view=revision&revision=305507

EPSS

Процентиль: 83%
0.021
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

redhat
больше 18 лет назад

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

nvd
больше 14 лет назад

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

github
около 3 лет назад

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

CVSS3: 3.7
fstec
больше 14 лет назад

Уязвимость функции file_exists интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 83%
0.021
Низкий