Vulnerability Name: | CVE-2004-0542 (CCN-16331) | ||||||||
Assigned: | 2004-06-06 | ||||||||
Published: | 2004-06-06 | ||||||||
Updated: | 2022-07-01 | ||||||||
Summary: | PHP before 4.3.7 on Win32 platforms does not properly filter all shell metacharacters, which allows local or remote attackers to execute arbitrary code, overwrite files, and access internal environment variables via (1) the "%", "|", or ">" characters to the escapeshellcmd function, or (2) the "%" character to the escapeshellarg function. | ||||||||
CVSS v3 Severity: | 9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
Vulnerability Type: | CWE-noinfo | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: Full-Disclosure Mailing List, Sun Jun 06 2004 - 06:25:30 CDT PHP escapeshellarg Windows Vulnerability Source: CCN Type: PHP Web site php_value|flag / php_admin_* settings "leak" from vhosts/.htaccess files Source: MITRE Type: CNA CVE-2004-0542 Source: MISC Type: Not Applicable http://www.idefense.com/application/poi/display?id=108 Source: CCN Type: iDEFENSE Security Advisory 06.07.04 PHP Win32 escapeshellcmd() and escapeshellarg() Input Validation Vulnerability Source: CCN Type: OSVDB ID: 6710 PHP escapeshellcmd() Security Bypass Source: CCN Type: OSVDB ID: 6737 PHP escapeshellarg() Security Bypass Source: CONFIRM Type: Patch, Release Notes, Vendor Advisory http://www.php.net/release_4_3_7.php Source: CCN Type: BID-10471 PHP Microsoft Windows Shell Escape Functions Command Execution Vulnerability Source: XF Type: Third Party Advisory, VDB Entry php-escapeshellarg-execute-command(16331) Source: XF Type: UNKNOWN php-escapeshellarg-execute-command(16331) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |