Summary
PHP is prone to a cross-site scripting vulnerability and to a code execution vulnerability.
Attackers can exploit the code execution vulnerability to execute arbitrary code within the context of the PHP process. This may allow them to bypass intended security restrictions or gain elevated privileges.
An attacker may leverage the cross-site scripting vulnerability to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may let the attacker steal cookie-based authentication credentials and launch other attacks.
Versions prior to PHP 5.2.12 are vulnerable.
Solution
Updates are available
please see the references for more information.
References
- http://bugs.php.net/bug.php?id=49785
- http://d.hatena.ne.jp/t_komura/20091004/1254665511
- http://www.blackhat.com/presentations/bh-usa-09/ESSER/BHUSA09-Esser-PostExploitationPHP-PAPER.pdf
- http://www.php.net
- http://www.php.net/ChangeLog-5.php#5.2.12
- http://www.php.net/releases/5_2_12.php
- http://www.securityfocus.com/bid/37389
- http://www.securityfocus.com/bid/37390
Updated on 2017-03-28
Severity
Classification
-
CVE CVE-2009-4142, CVE-2009-4143 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities