Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-3799

Опубликовано: 16 июл. 2007
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 4.3

Описание

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

edgy

ignored

end of life, was needed
feisty

DNE

gutsy

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

needed

Показывать по

РелизСтатусПримечание
dapper

released

5.1.2-1ubuntu3.10
devel

not-affected

5.2.4-2ubuntu3
edgy

released

5.1.6-1ubuntu2.7
feisty

released

5.2.1-0ubuntu1.5
gutsy

released

5.2.3-1ubuntu6.1
hardy

not-affected

5.2.4-2ubuntu3
intrepid

not-affected

5.2.4-2ubuntu3
jaunty

not-affected

5.2.4-2ubuntu3
karmic

not-affected

5.2.4-2ubuntu3
upstream

released

5.2.3

Показывать по

EPSS

Процентиль: 92%
0.09604
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
около 18 лет назад

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

nvd
почти 18 лет назад

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

debian
почти 18 лет назад

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5 ...

github
около 3 лет назад

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote attackers to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

oracle-oval
почти 18 лет назад

ELSA-2007-0890: Moderate: php security update (MODERATE)

EPSS

Процентиль: 92%
0.09604
Низкий

4.3 Medium

CVSS2