The session extension in PHP 4 before 4.4.5, and PHP 5 before 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent attackers to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506 - | |
References | () http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137 - | |
References | () http://secunia.com/advisories/25056 - | |
References | () http://secunia.com/advisories/25057 - | |
References | () http://secunia.com/advisories/25062 - | |
References | () http://secunia.com/advisories/25423 - | |
References | () http://secunia.com/advisories/25445 - | |
References | () http://secunia.com/advisories/25850 - | |
References | () http://security.gentoo.org/glsa/glsa-200705-19.xml - | |
References | () http://www.debian.org/security/2007/dsa-1283 - | |
References | () http://www.novell.com/linux/security/advisories/2007_32_php.html - | |
References | () http://www.php-security.org/MOPB/MOPB-30-2007.html - | |
References | () http://www.securityfocus.com/bid/23119 - Exploit | |
References | () http://www.ubuntu.com/usn/usn-455-1 - | |
References | () http://www.vupen.com/english/advisories/2007/1991 - | |
References | () http://www.vupen.com/english/advisories/2007/2374 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/33520 - |
Information
Published : 2007-03-27 01:19
Updated : 2024-11-21 00:28
NVD link : CVE-2007-1700
Mitre link : CVE-2007-1700
CVE.ORG link : CVE-2007-1700
JSON object : View
Products Affected
php
- php
CWE