PHP Input Variables Exceeded

medium Web App Scanning Plugin ID 114322

Synopsis

PHP Input Variables Exceeded

Description

By default, PHP accepts a maximum of 1000 variables in a request. If there are more input variables than specified, an E_WARNING is issued, and further input variables are truncated from the request depending on server configuration and application code, this can have various impacts such as bypassing function call.

Solution

Disable all notice, warning and error displaying. Configure the application to log such messages in a file. A code review is also necessary to check the impact it may have on the application.

See Also

https://hackmd.io/@terjanq/justCTF2020-writeups#Baby-CSP-web-6-solves-406-points

https://www.php.net/manual/en/info.configuration.php#ini.max-input-vars

https://x.com/pilvar222/status/1784618120902005070

Plugin Details

Severity: Medium

ID: 114322

Type: remote

Published: 6/26/2024

Updated: 6/26/2024

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 2.9

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: Tenable

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

CVSS Score Source: Tenable

CVSS v4

Risk Factor: Medium

Base Score: 6.9

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

CVSS Score Source: Tenable

Reference Information