PHP 5.4.x < 5.4.1 Multiple Vulnerabilities

medium Nessus Network Monitor Plugin ID 6994

Synopsis

The remote web server uses a version of PHP that is affected by multiple vulnerabilities.

Description

PHP versions 5.4.x earlier than 5.4.1 are affected by the following vulnerabilities :

- The '$_FILES' variable can be corrupted because the names of uploaded files are not properly validated. (CVE-2012-1172)

- The 'open_basedir' directive is not properly handled by the functions 'readline_write_history' and 'readline_read_history'.

- It's possible to bypass an HTTP response-splitting protection because the 'sapi_header_op()' function in main/SAPI.c does not properly determine a pointer during checks for encoded carriage return characters. (Bug #60227 / CVE-2012-4388)

Solution

Upgrade to PHP version 5.4.1 or later.

See Also

http://www.php.net/archive/2012.php#id2012-04-26-1

http://www.nessus.org/u?e81d4026

https://bugs.php.net/bug.php?id=54374

https://bugs.php.net/bug.php?id=60227

http://www.php.net/ChangeLog-5.php#5.4.1

Plugin Details

Severity: Medium

ID: 6994

Family: Web Servers

Published: 8/20/2013

Updated: 3/6/2019

Nessus ID: 58967

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:php:php

Patch Publication Date: 4/26/2012

Vulnerability Publication Date: 4/26/2012

Reference Information

CVE: CVE-2012-1172, CVE-2012-4388

BID: 53403, 55527