BeyondTrust

Security in Context: The BeyondTrust Blog

Welcome to the Zeroday Tracker: Your Vulnerability Watchlist

Get critical updates on the latest zeroday threats, including impact, mitigation and protection information - only from BeyondTrust.

PHP Query String Parameter Command Execution

Disclosed May 3, 2012    Fully Patched

Vulnerability Description:

PHP contains two vulnerabilities when parsing QUERY_STRING parameters and when processing the apache_request_headers() function. Both vulnerabilities may allow arbitrary code execution, if successfully exploited by remote attackers.

Vendors:

PHP

Vulnerable Software/Devices:

PHP 5.3.12 and earlier
PHP 5.4.2 and earlier

Vulnerability Severity:

High

Exploit Availability:

N/A

Exploit Impact:

Remote Code Execution
Remote Code Execution Exploitation of this vulnerability is possible through the use of methods like drive-by attacks. Remote attackers who successfully exploit this vulnerability will be able to execute code on the vulnerable system with the same rights as the currently logged on user.

BeyondTrust Prevention and Detection:

Beyond Trust's Retina® Network Security Scanner scans devices to detect for this vulnerability.

  • 16398 - PHP Multiple Vulnerabilities (20120508) - Banner
  • 16399 - PHP Multiple Vulnerabilities (20120508) - Credentialed

Mitigation:

No mitigations available. 

Links:

CVE(s):

None

Leave a Reply