Korean
<< Back
VID 22380
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Web server is running a version of PHP which is older than 5.0.6 or 4.4.1. PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML. PHP versions prior to 5.0.6 or 4.4.1 are reported prone to multiple local and remote vulnerabilities that may lead to code execution within the context of the vulnerable process. The following specific issues are reported:

- PHP is vulnerable to a vulnerability that allows attackers to overwrite the $GLOBALS variable via HTTP POST requests.
- PHP is vulnerable to a weakness that allows attackers to re-enable the 'register_globals' directive. This issue is due to a failure of the application to handle a memory limit exception.
- PHP is vulnerable to a cross-site scripting vulnerability in the phpinfo() function.
- PHP makes use of an affected PCRE Regular Expression library and ships with an affected XML-RPC library and is therefore potentially vulnerable to remote execution of arbitrary code.

* Note: This check solely relied on the banner of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.hardened-php.net/advisory_182005.77.html
http://www.hardened-php.net/advisory_182005.78.html
http://www.hardened-php.net/advisory_202005.79.html
http://www.php.net/release_4_4_1.php

* Platforms Affected:
PHP versions prior to 4.4.1
PHP versions prior to 5.0.6
Any operating systems Any version
Recommendation Upgrade to the latest version of PHP (5.0.6 or 4.4.1 or later), available from the PHP Web site at http://www.php.net
Related URL CVE-2005-2491 (CVE)
Related URL 14620,15248,15249,15250 (SecurityFocus)
Related URL (ISS)