VID |
22675 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP 5.3.x installed on the remote host is a version prior to 5.3.13. It is, therefore, affected by the following vulnerability :
- when configured as a CGI script (aka php-cgi), does not properly handle query strings that contain a %3D sequence but no = (equals sign) character, which allows remote attackers to execute arbitrary code by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'd' case.
- php-wrapper.fcgi does not properly handle command-line arguments, which allows remote attackers to bypass a protection mechanism in PHP 5.3.12 and 5.4.2 and execute arbitrary code by leveraging improper interaction between the PHP sapi/cgi/cgi_main.c component and a query string beginning with a +- sequence.
- when configured as a CGI script (aka php-cgi), does not properly handle query strings that lack an = (equals sign) character, which allows remote attackers to cause a denial of service (resource consumption) by placing command-line options in the query string, related to lack of skipping a certain php_getopt for the 'T' case.
* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.
* References: https://bugs.php.net/bug.php?id=61910 http://www.php.net/archive/2012.php#id2012-05-08-1 http://www.php.net/ChangeLog-5.php#5.3.13
* Platforms Affected: PHP Prior to 5.3.13 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.3.13 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
CVE-2012-2311,CVE-2012-2335,CVE-2012-2336 (CVE) |
Related URL |
53388 (SecurityFocus) |
Related URL |
(ISS) |
|