Vulnerability Name: | CVE-2004-0959 (CCN-17392) |
Assigned: | 2004-09-15 |
Published: | 2004-09-15 |
Updated: | 2017-10-11 |
Summary: | rfc1867.c in PHP before 5.0.2 allows local users to upload files to arbitrary locations via a PHP script with a certain MIME header that causes the "$_FILES" array to be modified. |
CVSS v3 Severity: | 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)Exploitability Metrics: | Attack Vector (AV): Local Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): Low Availibility (A): None |
|
CVSS v2 Severity: | 2.1 Low (CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Local Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None |
|
Vulnerability Type: | CWE-Other
|
Vulnerability Consequences: | Gain Access |
References: | Source: CCN Type: BugTraq Mailing List, Wed Sep 29 2004 - 02:01:45 CDT Php RFC1867 Upload Vuln. POC Released
Source: CCN Type: VulnWatch Mailing List, Wed Sep 15 2004 - 12:07:37 CDT VulnWatch] Php Vulnerability N. 2
Source: VULNWATCH Type: UNKNOWN 20040915 Php Vulnerability N. 2
Source: MITRE Type: CNA CVE-2004-0959
Source: BUGTRAQ Type: UNKNOWN 20040915 Php Vulnerability N. 2
Source: CCN Type: RHSA-2004-687 php security update
Source: CCN Type: SA12560 PHP Memory Leak and Arbitrary File Location Upload Vulnerabilities
Source: SECUNIA Type: UNKNOWN 12560
Source: CCN Type: SECTRACK ID: 1011307 PHP Array Processing Error in Handling RFC1867 MIME Formatting May Let Remote Users Overwrite Memory
Source: SECTRACK Type: UNKNOWN 1011307
Source: CCN Type: GLSA-200410-04 PHP: Memory disclosure and arbitrary location file upload
Source: CCN Type: Fedora Update Notification FEDORA-2004-567 Fedora: php-4.3.10-2.4 update
Source: CCN Type: OSVDB ID: 11148 PHP $_FILE Upload Overflow
Source: CCN Type: PHP Web site PHP: Downloads
Source: REDHAT Type: Patch, Vendor Advisory RHSA-2004:687
Source: CCN Type: BID-11190 PHP Remote Arbitrary Location File Upload Vulnerability
Source: FEDORA Type: UNKNOWN FLSA:2344
Source: XF Type: UNKNOWN php-mime-array-execute-code(17392)
Source: XF Type: UNKNOWN php-mime-array-execute-code(17392)
Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:10961
|
Vulnerable Configuration: | Configuration 1: cpe:/a:php:php:*:*:*:*:*:*:*:* (Version <= 5.0.2) Configuration RedHat 1: cpe:/o:redhat:enterprise_linux:*:*:*:*:*:*:*:* Configuration CCN 1: cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*OR cpe:/a:php:php:4.1.1:*:*:*:*:*:*:*OR cpe:/a:php:php:4.2.0:-:*:*:*:*:*:*OR cpe:/a:php:php:4.2.1:-:*:*:*:*:*:*OR cpe:/a:php:php:4.2.3:-:*:*:*:*:*:*OR cpe:/a:php:php:4.2.2:*:*:*:*:*:*:*OR cpe:/a:php:php:4.3.0:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.4:-:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.3:-:*:*:*:*:*:*OR cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*OR cpe:/a:php:php:4.0.1:-:*:*:*:*:*:*OR cpe:/a:php:php:4.0.2:*:*:*:*:*:*:*OR cpe:/a:php:php:4.0.3:*:*:*:*:*:*:*OR cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*OR cpe:/a:php:php:4.0.6:-:*:*:*:*:*:*OR cpe:/a:php:php:4.0.7:-:*:*:*:*:*:*OR cpe:/a:php:php:4.0:beta_4_patch1:*:*:*:*:*:*OR cpe:/a:php:php:4.0:beta1:*:*:*:*:*:*OR cpe:/a:php:php:4.0:beta2:*:*:*:*:*:*OR cpe:/a:php:php:4.0:beta3:*:*:*:*:*:*OR cpe:/a:php:php:4.0:beta4:*:*:*:*:*:*OR cpe:/a:php:php:4.1.0:-:*:*:*:*:*:*OR cpe:/a:php:php:4.1.2:*:*:*:*:*:*:*OR cpe:/a:php:php:4.3.1:*:*:*:*:*:*:*OR cpe:/a:php:php:4.3.2:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.5:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.6:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.7:-:*:*:*:*:*:*OR cpe:/a:php:php:4.3.8:*:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*OR cpe:/a:php:php:4.0:rc1:*:*:*:*:*:*OR cpe:/a:php:php:4.0:rc2:*:*:*:*:*:*AND cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
Denotes that component is vulnerable |
Oval Definitions |
|
BACK |