Description
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
Remediation
References
Related Vulnerabilities
WordPress Plugin Content Audit Blind SQL Injection (1.6)
Joomla Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2017-7989)
Apache Tomcat Improper Input Validation Vulnerability (CVE-2016-3092)
PHP Other Vulnerability (CVE-2005-3883)
Joomla! Core 1.0.x Unspecified Vulnerability (1.0.0 - 1.0.3)