VID |
22576 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP installed on the remote host is 5.3.x earlier than 5.3.21, and is, therefore, potentially affected by a weakness in the cURL extension that can allow SSL spoofing and man-in-the-middle attacks. When attempting to validate a certificate, the cURL library (libcurl) fails to verify that a server hostname matches a domain name in an X.509 certificate's 'Subject Common Name' (CN) or 'SubjectAltName'.
* Note: This check solely relied on the version number of the remote WebLogic server to assess this vulnerability, so this might be a false positive.
* References: http://www.php.net/ChangeLog-5.php#5.3.21 https://bugs.php.net/bug.php?id=63352 https://bugs.php.net/bug.php?id=63795
* Platforms Affected: PHP Prior to 5.3.21 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.3.21 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
(CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|