Some vulnerabilities have been reported in PHP, which can be exploited by malicious people to conduct cross-site scripting attacks, bypass certain security restrictions, and potentially compromise a vulnerable system.
1) An error where the "GLOBALS" array is not properly protected, can be exploited to define global variables by sending a "multipart/form-data" POST request with a specially crafted file upload field, or via a script calling the PHP function "extract()" or "import_request_variables()".
Successful exploitation may open up for vulnerabilities in various applications, but requires that "register_globals" is enabled.
2) An error in the handling of an unexpected termination in the "parse_str()" PHP function, can be exploited to enable the "register_globals" directive for the current execution by e.g. triggering a memory_limit request shutdown in a script calling "parse_str()".
3) Some unspecified input passed to the "phpinfo()" PHP function isn't properly sanitised before being returned to the user. This can be exploited via a script calling "phpinfo()" to execute arbitrary HTML and script code in a user's browser session in context of an affected site.
4) An integer overflow error in pcrelib may be exploited to cause a memory corruption via a script calling a PHP function using the PCRE library where the regular expression can be controlled by the attacker.
Do you have additional information related to this advisory?
Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this
information to firstname.lastname@example.org
Subject: PHP Multiple Vulnerabilities
No posts yet
You must be logged in to post a comment.
Secunia Customer Login
Not a customer already?
Learn more about how our market leading Vulnerability Management solutions can help you manage risk and ensure compliance.