[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247862

 
 

909

 
 

194603

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Directory Traversal Vulnerability in PHP via specially crafted requests

ID: oval:org.secpod.oval:def:5831Date: (C)2012-05-24   (M)2023-12-07
Class: VULNERABILITYFamily: windows




The host is installed with PHP before 5.4.0 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to properly handle invalid [ (open square bracket) characters in name values. Successful exploitation allows attackers to cause a denial of service or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own filename restrictions.

Platform:
Microsoft Windows 2000
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows Vista
Microsoft Windows XP
Microsoft Windows 8
Product:
PHP
Reference:
CVE-2012-1172
CVE    1
CVE-2012-1172
CPE    50
cpe:/a:php:php:5.0.0:rc3
cpe:/a:php:php:5.3.10
cpe:/a:php:php:5.0.0:rc2
cpe:/a:php:php:5.0.0:rc1
...

© SecPod Technologies