Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-5120

Опубликовано: 31 июл. 2014
Источник: redhat
CVSS2: 4.3
EPSS Средний

Описание

gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.

It was found that PHP's gd extension did not properly handle file names with a null character. A remote attacker could possibly use this flaw to make a PHP application access unexpected files and bypass intended file system access restrictions.

Отчет

This issue does not affect the current php and php53 packages in Red Hat Enterprise Linux 5 and 6, as it was previously corrected as part of the fix for CVE-2006-7243.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 5phpNot affected
Red Hat Enterprise Linux 5php53Not affected
Red Hat Enterprise Linux 6phpNot affected
Red Hat Enterprise Linux 7phpFixedRHSA-2014:132730.09.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6php54-phpFixedRHSA-2014:176530.10.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6php55-phpFixedRHSA-2014:176630.10.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUSphp54-phpFixedRHSA-2014:176530.10.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.4 EUSphp55-phpFixedRHSA-2014:176630.10.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUSphp54-phpFixedRHSA-2014:176530.10.2014
Red Hat Software Collections 1 for Red Hat Enterprise Linux 6.5 EUSphp55-phpFixedRHSA-2014:176630.10.2014

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-626
https://bugzilla.redhat.com/show_bug.cgi?id=1132793php: gd extension NUL byte injection in file names

EPSS

Процентиль: 93%
0.11726
Средний

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.

nvd
почти 11 лет назад

gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.

debian
почти 11 лет назад

gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x befo ...

github
около 3 лет назад

gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.

fstec
почти 11 лет назад

Уязвимость программного обеспечения PHP, позволяющая удаленному злоумышленнику нарушить целостность и доступность защищаемой информации

EPSS

Процентиль: 93%
0.11726
Средний

4.3 Medium

CVSS2