CVE-2012-1172
Published: 23 May 2012
The file-upload implementation in rfc1867.c in PHP before 5.4.0 does not properly handle invalid [ (open square bracket) characters in name values, which makes it easier for remote attackers to cause a denial of service (malformed $_FILES indexes) or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own filename restrictions.
Notes
Author | Note |
---|---|
jdstrand | some argue bug is in script, not the language, but PHP does try to sanitize $_FILES. Script writers may be relying on that. |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
hardy |
Released
(5.2.4-2ubuntu5.25)
|
lucid |
Released
(5.3.2-1ubuntu4.17)
|
|
maverick |
Ignored
(end of life)
|
|
natty |
Released
(5.3.5-1ubuntu7.10)
|
|
oneiric |
Released
(5.3.6-13ubuntu3.8)
|
|
precise |
Released
(5.3.10-1ubuntu3.2)
|
|
upstream |
Released
(5.3.11,5.4.0)
|
|
Patches: upstream: http://svn.php.net/viewvc?view=revision&revision=321664 (trunk) upstream: http://git.php.net/?p=php-src.git;a=commit;h=95dcd799fb6fdccbc60d3bba3cd759f6b421ee69 (5.3) upstream: http://git.php.net/?p=php-src.git;a=commit;h=baeaafd3951451c7dadf949c7677e90141c1e17a (5.3 test) |