Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2007-1701

Опубликовано: 27 мар. 2007
Источник: nvd
CVSS2: 6.8
EPSS Низкий

Описание

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

Ссылки

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Версия от 4.0.0 (включая) до 4.4.5 (исключая)
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Версия от 5.0.0 (включая) до 5.2.1 (исключая)

EPSS

Процентиль: 92%
0.09511
Низкий

6.8 Medium

CVSS2

Дефекты

CWE-502

Связанные уязвимости

ubuntu
больше 18 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

redhat
больше 18 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

debian
больше 18 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is e ...

github
около 3 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

EPSS

Процентиль: 92%
0.09511
Низкий

6.8 Medium

CVSS2

Дефекты

CWE-502