New Search

NULL byte injection vulnerability in PHP before 5.3.4

oval:org.mitre.oval:def:12569

PHP before 5.3.4 accepts the \0 character in a pathname which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.

Family:
windows
Status:
ACCEPTED
Platform(s):
  • Microsoft Windows Vista
  • Microsoft Windows 7
  • Microsoft Windows 2000
  • Microsoft Windows Server 2003
  • Microsoft Windows XP
  • Microsoft Windows Server 2008
Class:
vulnerability
Reference(s):
  • CVE-2006-7243
Product(s):
  • PHP