5
CVSSv2

CVE-2004-1020

Published: 10/01/2005 Updated: 11/07/2017
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The addslashes function in PHP 4.3.9 does not properly escape a NULL (/0) character, which may allow remote malicious users to read arbitrary files in PHP applications that contain a directory traversal vulnerability in require or include statements, but are otherwise protected by the magic_quotes_gpc mechanism. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.3.7

php php 4.3.8

php php 5.0

php php 5.0.1

php php 5.0.2

php php 4.3.6

php php 4.3.9

php php 5.0.0

Exploits

source: wwwsecurityfocuscom/bid/11981/info PHP4 and PHP5 are reported prone to multiple remotely exploitable vulnerabilities These issue result from insufficient sanitization of user-supplied data A remote attacker may carry out directory traversal attacks to disclose arbitrary files and upload files to arbitrary locations It is repor ...