CVE-2006-7243
Published: 18 January 2011
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
Notes
Author | Note |
---|---|
sbeattie | upstream only prepared a fix for the 5.3 tree. Backporting the fix to 5.2.x requires modifying php APIs. |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
dapper |
Ignored
(end of life)
|
hardy |
Ignored
(end of life)
|
|
karmic |
Released
(5.2.10.dfsg.1-2ubuntu6.9)
|
|
lucid |
Released
(5.3.2-1ubuntu4.8)
|
|
maverick |
Released
(5.3.3-1ubuntu9.4)
|
|
natty |
Not vulnerable
(5.3.5-1ubuntu1)
|
|
oneiric |
Not vulnerable
(5.3.5-1ubuntu1)
|
|
upstream |
Released
(5.3.4)
|
|
Patches: upstream: http://svn.php.net/viewvc?view=revision&revision=305507 upstream: http://svn.php.net/viewvc?view=revision&revision=305412 |