logo
DATABASE RESOURCES PRICING ABOUT US

Arbitrary Code Execution

Description

php-cgi is susceptible to arbitrary code execution. An attacker can inject arbitrary script because it does not properly handle the query strings without an = (equals sign) character, leading to malicious code execution with the privileges of the PHP interpreter.


Affected Software


CPE Name Name Version
php 5.2.6__2.el5s2
php 5.1.6__15.el5
php 5.2.10__1.el5s2
php 5.1.6__23.2.el5_3
php 5.1.6__27.el5_5.3
php 5.3.2__6.el6
php 5.1.6__11.el5
php 5.1.6__27.el5
php 5.2.6__4.el5s2
php 5.1.6__34.el5_8
php 5.1.6__12.el5
php 5.1.6__27.el5_7.5
php 5.1.6__20.el5
php 5.1.6__32.el5
php 5.1.6__23.el5
php 5.3.2__6.el6_0.1
php 5.2.3__3.el5s2
php 5.2.9__2.el5s2
php 5.2.3__1.el5s2
php 5.1.6__7.el5
php 5.1.6__27.el5_7.4
php 5.1.6__20.el5_2.1
php 5.1.6__5.el5
php 5.1.6__24.el5_4.5
php53 5.3.3__5.el5
php53 5.3.3__1.el5_7.6
php53 5.3.3__1.el5_7.5
php53 5.3.3__1.el5_6.1
php53 5.3.3__1.el5_7.3
php53 5.3.3__1.el5

Related