PHPIDS before 0.7 does not properly implement Regular Expression Denial of Service (ReDoS) filters, which allows remote attackers to bypass rulesets and add PHP sequences to a file via unspecified vectors.
References
Link | Resource |
---|---|
https://sitewat.ch/Advisory/View/7 | URL Repurposed |
https://sitewat.ch/Advisory/View/7 | URL Repurposed |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 01:33
Type | Values Removed | Values Added |
---|---|---|
References | () https://sitewat.ch/Advisory/View/7 - URL Repurposed |
14 Feb 2024, 01:17
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://sitewat.ch/Advisory/View/7 - URL Repurposed |
Information
Published : 2011-12-29 04:15
Updated : 2024-11-21 01:33
NVD link : CVE-2011-5021
Mitre link : CVE-2011-5021
CVE.ORG link : CVE-2011-5021
JSON object : View
Products Affected
phpids
- phpids
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')