Korean
<< Back
VID 22675
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description According to its banner, the version of PHP 5.3.x installed on the remote host is a version prior to 5.3.13. It is, therefore, affected by the following vulnerability :

- when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.

- php-wrapper.fcgi does not properly handle command-line arguments, which allows remote attackers to bypass a protection mechanism in PHP 5.3.12 and 5.4.2 and execute arbitrary code by leveraging improper interaction between the PHP sapi/cgi/cgi_main.c component and a query string beginning with a +- sequence.

- when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case.

* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.

* References:
https://bugs.php.net/bug.php?id=61910
http://www.php.net/archive/2012.php#id2012-05-08-1
http://www.php.net/ChangeLog-5.php#5.3.13

* Platforms Affected:
PHP Prior to 5.3.13
Any operating system Any version
Recommendation Upgrade to the latest version of PHP (5.3.13 or later), available from the PHP web site at http://www.php.net/downloads.php
Related URL CVE-2012-2311,CVE-2012-2335,CVE-2012-2336 (CVE)
Related URL 53388 (SecurityFocus)
Related URL (ISS)