Korean
<< Back
VID 22270
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Web server is running a version of PHP 4.3 which is older or equal to 4.3.7.
PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. PHP 4.3.x up to 4.3.7, and 5.x up to 5.0.0RC3 contain two vulnerabilities as follows:

1. It could allow a remote attacker to inject arbitrary script tags in Microsoft Internet Explorer and Safari Web browsers, caused by improper handling of HTML tags within the strip_tag function. An attacker could exploit this vulnerability to launch further attacks against a vulnerable system, such as cross-site scripting attacks.
2. Under certain conditions such as when register_globals is enabled, it could allow a remote attacker to execute arbitrary code on the server. If memory_limit support is enabled, a remote attacker could send a specially-crafted request to invoke the memory_limit request termination where there is an unsafe interruption to execute arbitrary code on the PHP server.

* References:
http://lists.netsys.com/pipermail/full-disclosure/2004-July/023908.html
http://security.e-matters.de/advisories/122004.html
http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0576.html
http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0577.html
http://www.osvdb.org/displayvuln.php?osvdb_id=7870
http://www.osvdb.org/displayvuln.php?osvdb_id=7871

* Platforms Affected:
Microsoft Internet Explorer
Safari Web browser
PHP 4.3.7 and earlier
PHP5 5.0.0RC3 and earlier
Microsoft Windows Any version
Unix Any version
Linux Any version
Recommendation For PHP4:
Upgrade to the latest version of PHP4 (4.3.8 or later), available from the PHP Web site at http://www.php.net

For PHP5:
Upgrade to the latest version of PHP5 (5.0.0 dated 13-Jul-2004 or later), available from the PHP Web site at http://www.php.net

For Mandrake Linux:
Upgrade to the latest php package, as listed in MandrakeSoft Security Advisory MDKSA-2004:068 at http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2004:068

For Gentoo Linux:
Upgrade to the latest version of php (4.3.8 or later), as listed in Gentoo Linux Security Advisory GLSA 200407-13 at http://www.gentoo.org/security/en/glsa/glsa-200407-13.xml

For other distributions:
Contact your vendor for upgrade or patch information.
Related URL CVE-2004-0594,CVE-2004-0595 (CVE)
Related URL 10724,10725 (SecurityFocus)
Related URL 16693,16692 (ISS)