Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-g5mc-mmqp-q5j8

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

EPSS

Процентиль: 93%
0.11353
Средний

Дефекты

CWE-502

Связанные уязвимости

ubuntu
почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

redhat
почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

nvd
почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

debian
почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is e ...

EPSS

Процентиль: 93%
0.11353
Средний

Дефекты

CWE-502