Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2007-1701

Опубликовано: 14 фев. 2007
Источник: redhat

Описание

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

Отчет

This CVE name is a duplicate as the vulnerability is addressed by CVE-2007-0910.

Дополнительная информация

Статус:

Important
https://bugzilla.redhat.com/show_bug.cgi?id=240431php session extension global variable clobber

Связанные уязвимости

ubuntu
больше 18 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

nvd
больше 18 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".

debian
больше 18 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is e ...

github
около 3 лет назад

PHP 4 before 4.4.5, and PHP 5 before 5.2.1, when register_globals is enabled, allows context-dependent attackers to execute arbitrary code via deserialization of session data, which overwrites arbitrary global variables, as demonstrated by calling session_decode on a string beginning with "_SESSION|s:39:".