VID |
22680 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
According to its banner, the version of PHP 5.6.x installed on the remote host is a version prior to 5.6.9. The PHP versions are affected by multiple vulnerabilities :
- Multiple flaws exist related to using pathnames containing NULL bytes. A remote attacker can exploit these flaws, by combining the '\0' character with a safe file extension, to bypass access restrictions. (CVE-2006-7243, CVE-2015-4025)
- An integer overflow condition exists in the ftp_genlist() function in ftp.c due to improper validation of user-supplied input. A remote attacker can exploit this to cause a heap-based buffer overflow, resulting in a denial of service condition or possible remote code execution. (CVE-2015-4022)
- A flaw exists in the multipart_buffer_headers() function in rfc1867.c due to improper handling of multipart/form-data in HTTP requests. A remote attacker can exploit this flaw to cause a consumption of CPU resources, resulting in a denial of service condition. (CVE-2015-4024)
- A security bypass vulnerability exists due to a flaw in the pcntl_exec implementation that truncates a pathname upon encountering the '\x00' character. A remote attacker can exploit this, via a crafted first argument, to bypass intended extension restrictions and execute arbitrary files. (CVE-2015-4026)
* Note: This check solely relied on the version number of the remote PHP to assess this vulnerability, so this might be a false positive.
* References: http://php.net/ChangeLog-5.php#5.6.9
* Platforms Affected: PHP Prior to 5.6.9 Any operating system Any version |
Recommendation |
Upgrade to the latest version of PHP (5.6.9 or later), available from the PHP web site at http://www.php.net/downloads.php |
Related URL |
CVE-2006-7243,CVE-2015-4022,CVE-2015-4024,CVE-2015-4025,CVE-2015-4026 (CVE) |
Related URL |
44951,74902,74903,74904,75056 (SecurityFocus) |
Related URL |
(ISS) |
|