Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-4143

Опубликовано: 16 дек. 2009
Источник: redhat
EPSS Низкий

Описание

PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.

Отчет

We do not consider safe_mode / open_basedir restriction bypass issues being security sensitive. For more details see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php

Ссылки на источники

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=548532php: $_SESSION usort() interruption corruption

EPSS

Процентиль: 92%
0.08138
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.

nvd
больше 15 лет назад

PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.

debian
больше 15 лет назад

PHP before 5.2.12 does not properly handle session data, which has uns ...

github
около 3 лет назад

PHP before 5.2.12 does not properly handle session data, which has unspecified impact and attack vectors related to (1) interrupt corruption of the SESSION superglobal array and (2) the session.save_path directive.

EPSS

Процентиль: 92%
0.08138
Низкий