Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2006-7243

Опубликовано: 18 дек. 2006
Источник: redhat
CVSS2: 4
EPSS Низкий

Описание

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Application Stack v2 for Enterprise LinuxphpWill not fix
Red Hat Enterprise Linux 4phpWill not fix
Red Hat Enterprise Linux 5php53FixedRHSA-2013:130730.09.2013
Red Hat Enterprise Linux 5phpFixedRHSA-2014:031118.03.2014
Red Hat Enterprise Linux 6phpFixedRHSA-2013:161520.11.2013

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-626
https://bugzilla.redhat.com/show_bug.cgi?id=662707php: paths with NULL character were considered valid

EPSS

Процентиль: 83%
0.021
Низкий

4 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 14 лет назад

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

nvd
больше 14 лет назад

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

debian
больше 14 лет назад

PHP before 5.3.4 accepts the \0 character in a pathname, which might a ...

github
около 3 лет назад

PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

CVSS3: 3.7
fstec
больше 14 лет назад

Уязвимость функции file_exists интерпретатора языка программирования PHP, позволяющая нарушителю обойти существующие ограничения безопасности

EPSS

Процентиль: 83%
0.021
Низкий

4 Medium

CVSS2