Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-5322-9p3h-7h5m

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

phpBB 2.0.17 and earlier, when register_globals is enabled and the session_start function has not been called to handle a session, allows remote attackers to bypass security checks by setting the $_SESSION and $HTTP_SESSION_VARS variables to strings instead of arrays, which causes an array_merge function call to fail.

phpBB 2.0.17 and earlier, when register_globals is enabled and the session_start function has not been called to handle a session, allows remote attackers to bypass security checks by setting the $_SESSION and $HTTP_SESSION_VARS variables to strings instead of arrays, which causes an array_merge function call to fail.

EPSS

Процентиль: 74%
0.00842
Низкий

Связанные уязвимости

ubuntu
почти 20 лет назад

phpBB 2.0.17 and earlier, when register_globals is enabled and the session_start function has not been called to handle a session, allows remote attackers to bypass security checks by setting the $_SESSION and $HTTP_SESSION_VARS variables to strings instead of arrays, which causes an array_merge function call to fail.

nvd
почти 20 лет назад

phpBB 2.0.17 and earlier, when register_globals is enabled and the session_start function has not been called to handle a session, allows remote attackers to bypass security checks by setting the $_SESSION and $HTTP_SESSION_VARS variables to strings instead of arrays, which causes an array_merge function call to fail.

debian
почти 20 лет назад

phpBB 2.0.17 and earlier, when register_globals is enabled and the ses ...

EPSS

Процентиль: 74%
0.00842
Низкий