logo
DATABASE RESOURCES PRICING ABOUT US

Authorization Bypass

Description

php is vulnerable to authorization bypass. The vulnerability exists as an input validation flaw was discovered in the PHP session serializer. If a PHP script generated session variable names from untrusted user input, a remote attacker could use this flaw to inject an arbitrary variable into the PHP session.


Affected Software


CPE Name Name Version
php 5.1.6__7.el5
php 5.1.6__11.el5
php 5.1.6__20.el5_2.1
php 5.1.6__12.el5
php 5.1.6__20.el5
php 5.1.6__23.2.el5_3
php 5.1.6__24.el5_4.5
php 5.1.6__15.el5
php 5.1.6__23.el5
php 5.1.6__5.el5
php 5.1.6__7.el5
php 5.1.6__11.el5
php 5.1.6__20.el5_2.1
php 5.1.6__12.el5
php 5.1.6__20.el5
php 5.1.6__23.2.el5_3
php 5.1.6__24.el5_4.5
php 5.1.6__15.el5
php 5.1.6__23.el5
php 5.1.6__5.el5

Related