PHP 5.3.x < 5.3.1 Multiple Vulnerabilities

high Nessus Network Monitor Plugin ID 5242

Synopsis

The remote web server uses a version of PHP that is vulnerable to multiple attack vectors.

Description

According to its banner, the version of PHP 5.3.x installed on the remote host is earlier than 5.3.1. Such versions are potentially affected by multiple issues :

- Sanity checks are missing in exif processing.

- It is possible to bypass the 'safe_mode' configuration setting using 'tempnam()'.

- It is possible to bypass the 'open_basedir' configuration setting using 'posix_mkfifo()'.

- The 'safe_mode_include_dir' configuration setting may be ignored.

- Calling 'popen()' with an invalid mode can cause a crash.

- A safe_mode restriction-bypass vulnerability because environment variables specified for 'proc_open' are passed without checking them.

Solution

Upgrade to PHP version 5.3.1 or later.

See Also

http://www.securityfocus.com/archive/1/507982/30/0/threaded

http://www.php.net/releases/5_3_1.php

http://www.php.net/ChangeLog-5.php#5.3.1

Plugin Details

Severity: High

ID: 5242

Family: Web Servers

Published: 11/25/2009

Updated: 3/6/2019

Nessus ID: 42862

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.2

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS v3

Risk Factor: High

Base Score: 7.3

Temporal Score: 6.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:php:php

Patch Publication Date: 11/19/2009

Vulnerability Publication Date: 11/19/2009

Reference Information

CVE: CVE-2009-3557, CVE-2009-3559, CVE-2009-4017, CVE-2009-4018, CVE-2010-1128

BID: 36554, 36555, 37079, 37138