PHP CGI SAPI代码执行漏洞

漏洞信息详情

PHP CGI SAPI代码执行漏洞

漏洞简介

PHP 4.3.0的CGI模块存在未知漏洞。攻击者可以通过绕过CGI强制重定向设置(cgi.force_redirect或–enable-force-cgi-redirect),以PHP用户的身份访问任意文件,并且可能执行PHP代码。

漏洞公告

Gentoo Linux users who are running ‘dev-php/mod_php’ have been recommended to upgrade to ‘mod_php-4.3.1’ as follows:
emerge sync
emerge -u mod_php
emerge clean
OpenPKG has made fixes available. See referenced advisory for additional details.
This issue has been fixed in PHP version 4.3.1:
PHP PHP 4.3

参考网址

来源: GENTOO
名称: GLSA-200302-09
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=104567042700840&w=2

来源: BUGTRAQ
名称: 20030217 PHP Security Advisory: CGI vulnerability in PHP version 4.3.0
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=104550977011668&w=2

来源: www.slackware.com
链接:http://www.slackware.com/changelog/current.php?cpu=i386

来源: XF
名称: php-cgi-sapi-access(11343)
链接:http://www.iss.net/security_center/static/11343.php

来源: BID
名称: 6875
链接:http://www.securityfocus.com/bid/6875

来源: GENTOO
名称: GLSA-200302-09.1
链接:http://marc.theaimsgroup.com/?l=bugtraq&m=104567137502557&w=2

受影响实体

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享