logo
DATABASE RESOURCES PRICING ABOUT US

CVE-2012-1172

Description

The file-upload implementation in rfc1867.c in PHP before 5.4.0 does not properly handle invalid [ (open square bracket) characters in name values, which makes it easier for remote attackers to cause a denial of service (malformed $_FILES indexes) or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own filename restrictions. #### Bugs * <http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=663760> * <https://bugs.php.net/bug.php?id=55500> * <https://bugs.php.net/bug.php?id=54374> #### Notes Author| Note ---|--- [jdstrand](<https://launchpad.net/~jdstrand>) | some argue bug is in script, not the language, but PHP does try to sanitize $_FILES. Script writers may be relying on that.


Affected Package


OS OS Version Package Name Package Version
ubuntu 10.04 php5 5.3.2-1ubuntu4.17
ubuntu 11.04 php5 5.3.5-1ubuntu7.10
ubuntu 11.10 php5 5.3.6-13ubuntu3.8
ubuntu 12.04 php5 5.3.10-1ubuntu3.2
ubuntu upstream php5 5.3.11,5.4.0

Related