Vulnerabilities > CVE-2006-4433 - Unspecified vulnerability in PHP
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN php
nessus
Summary
PHP before 4.4.3 and 5.x before 5.1.4 does not limit the character set of the session identifier (PHPSESSID) for third party session handlers, which might make it easier for remote attackers to exploit other vulnerabilities by inserting PHP code into the PHPSESSID, which is stored in the session file. NOTE: it could be argued that this not a vulnerability in PHP itself, rather a design limitation that enables certain attacks against session handlers that do not account for this limitation.
Vulnerable Configurations
Nessus
NASL family | CGI abuses |
NASL id | PHP_4_4_3.NASL |
description | According to its banner, the version of PHP installed on the remote host is older than 4.4.3 / 5.1.4. Such versions may be affected by several issues, including a buffer overflow, heap corruption, and a flaw by which a variable may survive a call to |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22268 |
published | 2006-08-25 |
reporter | This script is Copyright (C) 2006-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22268 |
title | PHP < 4.4.3 / 5.1.4 Multiple Vulnerabilities |
Statements
contributor | Tomas Hoger |
lastmodified | 2008-10-30 |
organization | Red Hat |
statement | We do not consider this to be a PHP flaw. The problem is caused by the insufficient input validation performed by Zend platform. |
References
- http://secunia.com/advisories/21573
- http://secunia.com/advisories/21573
- http://securityreason.com/securityalert/1466
- http://securityreason.com/securityalert/1466
- http://www.hardened-php.net/advisory_052006.128.html
- http://www.hardened-php.net/advisory_052006.128.html
- http://www.osvdb.org/28233
- http://www.osvdb.org/28233
- http://www.osvdb.org/28273
- http://www.osvdb.org/28273
- http://www.securityfocus.com/archive/1/444263/100/0/threaded
- http://www.securityfocus.com/archive/1/444263/100/0/threaded
- http://www.vupen.com/english/advisories/2006/3388
- http://www.vupen.com/english/advisories/2006/3388