Summary
PHP is prone to a vulnerability because it fails to sufficiently sanitize user-supplied input.
Exploiting this issue can allow attackers to provide unexpected input and possibly bypass input-validation protection mechanisms. This can aid in further attacks that may utilize crafted user-supplied input.
Versions prior to PHP 5.3.4 are vulnerable.
Solution
Updates are available. Please see the references for more information.
References
Severity
Classification
-
CVE CVE-2010-3870 -
CVSS Base Score: 6.8
AV:N/AC:M/Au:N/C:P/I:P/A:P
Related Vulnerabilities
- APC PowerChute Business Edition Unspecified Cross Site Scripting Vulnerability
- Adobe LiveCycle Designer Untrusted Search Path Vulnerability (Windows)
- Apple Safari Webkit Multiple Vulnerabilities - March 2011
- Adobe Reader Multiple Vulnerabilities - Aug07 (Windows)
- Apple Safari WebKit Information Disclosure Vulnerability (Mac OS X)