VID |
22545 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The remote host is running a version of PHP that is affected by an arbitrary code execution vulnerability.
Specifically, the fix for the hash collision denial of service vulnerability (CVE-2011-4885) introduces a remote code execution vulnerability in the function 'php_register_variable_ex()' in the file 'php_variables.c'. A new configuration variable, 'max_input_vars', was added as a part of the fix. If the number of input variables exceeds this value and the variable being processed is an array, code execution can occur.
* Note: This check solely relied on the version number of the remote WebLogic server to assess this vulnerability, so this might be a false positive.
* References: https://gist.github.com/1725489 http://www.php.net/ChangeLog-5.php#5.3.10 http://thexploit.com/sec/critical-php-remote-vulnerability-introduced-in-fix-for-php-hashtable-collision-dos/ http://svn.php.net/viewvc?view=revision&revision=323007
* Platforms Affected: PHP Prior to 5.3.9 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.3.9 or later), available from the Mozilla Web site at http://www.php.net/downloads.php |
Related URL |
CVE-2012-0830 (CVE) |
Related URL |
51830 (SecurityFocus) |
Related URL |
(ISS) |
|