Vulnerability Name:

CVE-2007-5899 (CCN-38588)

Assigned:2007-11-08
Published:2007-11-08
Updated:2018-10-15
Summary:The output_add_rewrite_var function in PHP before 5.2.5 rewrites local forms in which the ACTION attribute references a non-local URL, which allows remote attackers to obtain potentially sensitive information by reading the requests for this URL, as demonstrated by a rewritten form containing a local session ID.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.4 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
3.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-200
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: PHP Bug #42869
URL rewrite mechanism - data sent to foreign sites

Source: CONFIRM
Type: UNKNOWN
http://bugs.php.net/bug.php?id=42869

Source: MITRE
Type: CNA
CVE-2007-5899

Source: CCN
Type: HP Security Bulletin HPSBUX02332 SSRT080056 rev.1
HP-UX running Apache with PHP, Remote Denial of Service (DoS), Gain Extended Privileges

Source: OSVDB
Type: UNKNOWN
38918

Source: CCN
Type: RHSA-2008-0505
Moderate: Red Hat Application Stack v2.1 security and enhancement update

Source: CCN
Type: RHSA-2008-0544
Moderate: php security update

Source: CCN
Type: RHSA-2008-0545
Moderate: php security and bug fix update

Source: CCN
Type: RHSA-2008-0546
Moderate: php security update

Source: CCN
Type: RHSA-2008-0582
Moderate: php security update

Source: CCN
Type: SA27648
PHP Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
27659

Source: SECUNIA
Type: UNKNOWN
27864

Source: SECUNIA
Type: UNKNOWN
28249

Source: SECUNIA
Type: UNKNOWN
30040

Source: SECUNIA
Type: UNKNOWN
30828

Source: SECUNIA
Type: UNKNOWN
31119

Source: SECUNIA
Type: UNKNOWN
31124

Source: SECUNIA
Type: UNKNOWN
31200

Source: CCN
Type: SECTRACK ID: 1018934
PHP Buffer Overflows, Filtering Bypass, and Configuration Bypass Bugs May Let Users Gain Elevated Privileges

Source: CCN
Type: ASA-2008-198
HP-UX running Apache with PHP Remote Denial of Service (DoS) Gain Extended Privileges (HPSBUX02332)

Source: CCN
Type: ASA-2008-313
php security update (RHSA-2008-0544)

Source: CCN
Type: ASA-2008-320
php security and bug fix update (RHSA-2008-0545)

Source: CCN
Type: ASA-2008-325
php security update (RHSA-2008-0546)

Source: CCN
Type: ASA-2008-326
php security update (RHSA-2008-0582)

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0242

Source: DEBIAN
Type: UNKNOWN
DSA-1444

Source: DEBIAN
Type: DSA-1444
php5 -- several vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:125

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:126

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:127

Source: CCN
Type: OSVDB ID: 38918
PHP output_add_rewrite_var Function Form Rewrite Information Disclosure

Source: CCN
Type: PHP Web site
PHP: Hypertext Preprocessor

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/ChangeLog-5.php#5.2.5

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/releases/5_2_5.php

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0505

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0544

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0545

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0546

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0582

Source: HP
Type: UNKNOWN
SSRT080056

Source: CCN
Type: BID-26403
PHP 5.2.4 and Prior Versions Multiple Vulnerabilities

Source: CCN
Type: TLSA-2008-27
Multiple vulnerabilities exist in php

Source: CCN
Type: USN-549-1
PHP vulnerabilities

Source: CCN
Type: USN-549-2
PHP regression

Source: UBUNTU
Type: UNKNOWN
USN-549-2

Source: CCN
Type: USN-628-1
PHP vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-628-1

Source: XF
Type: UNKNOWN
php-action-information-disclosure(38588)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-1943

Source: CONFIRM
Type: UNKNOWN
https://launchpad.net/bugs/173043

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:11211

Source: UBUNTU
Type: UNKNOWN
USN-549-1

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-3864

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:*:*:*:*:*:*:*:* (Version <= 5.2.4)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_application_stack:2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:es:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.mitre.oval:def:29150
    P
    RHSA-2008:0544 -- php security update (Moderate)
    2015-08-17
    oval:org.mitre.oval:def:17737
    P
    USN-628-1 -- php5 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:16967
    P
    USN-549-2 -- php5 regression
    2014-06-30
    oval:org.mitre.oval:def:17624
    P
    USN-549-1 -- php5 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:20198
    P
    DSA-1444-1 php5 several issues
    2014-06-23
    oval:org.mitre.oval:def:7538
    P
    DSA-1444 php5 -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:22394
    P
    ELSA-2008:0544: php security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:11211
    V
    The output_add_rewrite_var function in PHP before 5.2.5 rewrites local forms in which the ACTION attribute references a non-local URL, which allows remote attackers to obtain potentially sensitive information by reading the requests for this URL, as demonstrated by a rewritten form containing a local session ID.
    2013-04-29
    oval:com.redhat.rhsa:def:20080544
    P
    RHSA-2008:0544: php security update (Moderate)
    2008-07-16
    oval:com.redhat.rhsa:def:20080545
    P
    RHSA-2008:0545: php security and bug fix update (Moderate)
    2008-07-16
    oval:org.debian:def:1444
    V
    several vulnerabilities
    2008-01-23
    BACK
    php php *
    php php 5.0.3
    php php 5.0.4
    php php 5.0.0
    php php 5.0.5
    php php 5.1.1
    php php 5.1.2
    php php 5.1.4
    php php 5.0.2
    php php 5.1.6
    php php 5.2.0
    php php 5.2.1
    php php 5.2.3
    php php 5.0.0 beta1
    php php 5.0.0 beta2
    php php 5.0.0 beta3
    php php 5.0.0 beta4
    php php 5.0.0 rc1
    php php 5.0.0 rc2
    php php 5.0.0 rc3
    php php 5.0.1
    php php 5.1.0
    php php 5.1.3
    php php 5.1.5
    php php 5.2.2
    php php 5.2.4
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    hp hp-ux b.11.11
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    hp hp-ux b.11.23
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat linux advanced workstation 2.1
    canonical ubuntu 6.06
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    turbolinux turbolinux personal *
    turbolinux turbolinux multimedia *
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    hp hp-ux b.11.31
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2007.1
    redhat rhel application stack 2
    redhat enterprise linux 4.6.z ga
    redhat enterprise linux 4.6.z ga
    canonical ubuntu 8.04