Korean
<< Back
VID 22545
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The remote host is running a version of PHP that is affected by an arbitrary code execution vulnerability.

Specifically, the fix for the hash collision denial of service vulnerability (CVE-2011-4885) introduces a remote code execution vulnerability in the function 'php_register_variable_ex()' in the file 'php_variables.c'. A new configuration variable, 'max_input_vars', was added as a part of the fix. If the number of input variables exceeds this value and the variable being processed is an array, code execution can occur.

* Note: This check solely relied on the version number of the remote WebLogic server to assess this vulnerability, so this might be a false positive.

* References:
https://gist.github.com/1725489
http://www.php.net/ChangeLog-5.php#5.3.10
http://thexploit.com/sec/critical-php-remote-vulnerability-introduced-in-fix-for-php-hashtable-collision-dos/
http://svn.php.net/viewvc?view=revision&revision=323007

* Platforms Affected:
PHP Prior to 5.3.9
Any operating system Any version
Recommendation Upgrade to the latest version of PHP (5.3.9 or later), available from the Mozilla Web site at http://www.php.net/downloads.php
Related URL CVE-2012-0830 (CVE)
Related URL 51830 (SecurityFocus)
Related URL (ISS)