SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   PHP Vendors:   PHP Group
PHP Input Validation Hole Permits Cross-Site Scripting Attacks and Other Bugs Have Unspecified Impact
SecurityTracker Alert ID:  1016306
SecurityTracker URL:  http://securitytracker.com/id/1016306
CVE Reference:   CVE-2006-3016, CVE-2006-3017, CVE-2006-3018   (Links to External Site)
Date:  Jun 15 2006
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 5.1.3
Description:   Several vulnerabilities were reported in PHP. A remote user can conduct cross-site scripting attacks. Other security related flaws were reported but the impact was not specified.

The phpinfo() function does not properly filter HTML code from user-supplied input before displaying the input. For scripts that invoke phpinfo(), a user can cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the Php software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A user may be able to trigger a buffer overflow in the wordwrap() function. The impact was not specified.

A user may be able to trigger a heap corruption within the session extension. The impact was not specified.

A user may be able to cause a variable to persist after the unset() function is called. The impact was not specified.

Impact:   In some cases, a user can access the target user's cookies (including authentication cookies), if any, associated with the site running the PHP software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

The specific impact depends on the applications that use PHP.

The impact of the other vulnerabilities was not disclosed.

Solution:   The vendor has issued a fixed version (5.1.3), available at:

http://www.php.net/downloads.php

Vendor URL:  www.php.net/release_5_1_3.php (Links to External Site)
Cause:   Boundary error, Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Jul 12 2006 (Red Hat Issues Fix) PHP Input Validation Hole Permits Cross-Site Scripting Attacks and Other Bugs Have Unspecified Impact
Red Hat has released a fix for Red Hat Enterprise Linux 3 and 4.
Jul 25 2006 (Red Hat Issues Fix) PHP Input Validation Hole Permits Cross-Site Scripting Attacks and Other Bugs Have Unspecified Impact
Red Hat has released a fix for Red Hat Enterprise Linux 2.1.
Sep 21 2006 (Red Hat Issues Fix) PHP Input Validation Hole Permits Cross-Site Scripting Attacks and Other Bugs Have Unspecified Impact
Red Hat has released a fix for Red Hat Enterprise Linux 3 and 4.
Sep 21 2006 (Red Hat Issues Fix) PHP Input Validation Hole Permits Cross-Site Scripting Attacks and Other Bugs Have Unspecified Impact
Red Hat has released a fix for Red Hat Enterprise Linux 2.1.
Dec 11 2006 (Red Hat Issues Fix for Stronghold) PHP Input Validation Hole Permits Cross-Site Scripting Attacks and Other Bugs Have Unspecified Impact
Red Hat has issued a fix for Red Hat Stronghold 4.0 for Enterprise Linux.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC