[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2014-4721Date: (C)2014-07-07   (M)2023-12-22


The phpinfo implementation in ext/standard/info.c in PHP before 5.4.30 and 5.5.x before 5.5.14 does not ensure use of the string data type for the PHP_AUTH_PW, PHP_AUTH_TYPE, PHP_AUTH_USER, and PHP_SELF variables, which might allow context-dependent attackers to obtain sensitive information from process memory by using the integer data type with crafted values, related to a "type confusion" vulnerability, as demonstrated by reading a private SSL key in an Apache HTTP Server web-hosting environment with mod_ssl and a PHP 5.3.x mod_php.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 2.6
Exploit Score: 4.9
Impact Score: 2.9
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: HIGH
Authentication: NONE
Confidentiality: PARTIAL
Integrity: NONE
Availability: NONE
  
Reference:
SECUNIA-54553
SECUNIA-59794
SECUNIA-59831
DSA-2974
RHSA-2014:1765
RHSA-2014:1766
http://twitter.com/mikispag/statuses/485713462258302976
http://www-01.ibm.com/support/docview.wss?uid=swg21683486
http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
http://www.php.net/ChangeLog-5.php
https://bugs.php.net/bug.php?id=67498
https://www.sektioneins.de/en/blog/14-07-04-phpinfo-infoleak.html
openSUSE-SU-2014:0945
openSUSE-SU-2014:1236

CWE    1
CWE-200
OVAL    12
oval:org.secpod.oval:def:702112
oval:org.secpod.oval:def:601707
oval:org.secpod.oval:def:203390
oval:org.secpod.oval:def:52254
...

© SecPod Technologies