Summary
PHP is prone to a vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue can allow attackers to provide unexpected input and possibly bypass input-validation protection mechanisms. This can aid in further attacks that may utilize crafted user-supplied input.
Versions prior to PHP 5.3.4 are vulnerable.
Solution
Updates are available. Please see the references for more information.
References
Severity
Classification
-
CVE CVE-2010-3870 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- Apple Safari Secure Cookie Security Bypass Vulnerability (Mac OS X)
- Adobe Reader Old Plugin Signature Bypass Vulnerability (Windows)
- Apache Tomcat XML External Entity Information Disclosure Vulnerability
- Apache Tomcat AJP Request Remote Denial Of Service Vulnerability
- Apple Safari WebKit Information Disclosure Vulnerability (Windows)