| VID |
22291 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Web server is running a version of PHP which is older than 4.3.9 or 5.0.2. PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. PHP 4.x.x up to 4.3.8, and 5.x up to 5.0.1 are vulnerable to an arbitrary location file upload vulnerability, due to two bugs of the PHP application to properly sanitize user-supplied file name input. These two bugs in PHP may allow the disclosure of portions of memory and allow remote attackers to upload files to arbitrary locations. A remote attacker could exploit the first vulnerability to view memory contents. On a server with a script that provides file uploads, an attacker could exploit the second vulnerability to upload files to an arbitrary location. On systems where the HTTP server is allowed to write in a HTTP-accessible location, this could lead to remote execution of arbitrary commands with the rights of the HTTP server.
* References: http://www.securityfocus.com/archive/1/376865 http://www.securityfocus.com/archive/1/375370 http://viewcvs.php.net/viewcvs.cgi/php-src/NEWS.diff?r1=1.1247.2.724&r2=1.1247.2.726
* Platforms Affected: PHP 4.3.9 prior PHP 5.0.2 prior Any operating systems Any version |
| Recommendation |
Upgrade to the latest version of PHP (4.3.9 or 5.0.2 or later), available from the PHP Download site at http://www.php.net/downloads.php
For Gentoo Linux: Upgrade to the latest version of PHP (4.3.9 or later), as listed in Gentoo Linux Security Advisory GLSA 200410-04 at http://www.gentoo.org/security/en/glsa/glsa-200410-04.xml
For other distributions: Contact your vendor for upgrade or patch information. |
| Related URL |
CVE-2004-0959
CVE-2004-0959 (CVE) |
| Related URL |
11190 (SecurityFocus) |
| Related URL |
17392 (ISS) |
|