Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2007-1701

Опубликовано: 27 мар. 2007
Источник: nvd
CVSS2: 6.8
EPSS Средний

Описание

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Версия от 4.0.0 (включая) до 4.4.5 (исключая)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Версия от 5.0.0 (включая) до 5.2.1 (исключая)

EPSS

Процентиль: 93%
0.11353
Средний

6.8 Medium

CVSS2

Дефекты

CWE-502

Связанные уязвимости

ubuntu
почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

redhat
почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

debian
почти 19 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is e ...

github
почти 4 года назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

EPSS

Процентиль: 93%
0.11353
Средний

6.8 Medium

CVSS2

Дефекты

CWE-502