gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:11
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html - | |
References | () http://lists.opensuse.org/opensuse-updates/2014-09/msg00024.html - | |
References | () http://php.net/ChangeLog-5.php - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1327.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1765.html - | |
References | () http://rhn.redhat.com/errata/RHSA-2014-1766.html - | |
References | () http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html - | |
References | () https://bugs.php.net/bug.php?id=67730 - Vendor Advisory | |
References | () https://support.apple.com/HT204659 - |
Information
Published : 2014-08-23 01:55
Updated : 2024-11-21 02:11
NVD link : CVE-2014-5120
Mitre link : CVE-2014-5120
CVE.ORG link : CVE-2014-5120
JSON object : View
Products Affected
php
- php
CWE
CWE-20
Improper Input Validation