4.3
CVSSv2

CVE-2005-3388

Published: 01/11/2005 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in the phpinfo function in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5 allows remote malicious users to inject arbitrary web script or HTML via a crafted URL with a "stacked array assignment."

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.3.9

php php 4.2.0

php php 5.0.0

php php 4.1.0

php php 4.3.4

php php 4.0.4

php php 4.3.0

php php 4.0.5

php php 5.0.5

php php 4.3.6

php php 5.0.1

php php 4.0.7

php php 4.3.7

php php 5.0.4

php php 4.2.2

php php 4.3.2

php php 4.3.11

php php 4.0.0

php php 4.0.3

php php 4.0.2

php php 4.3.3

php php 4.1.1

php php 5.0.3

php php 4.2.3

php php 4.0.1

php php 4.0.6

php php 4.1.2

php php 4.3.1

php php 4.4.0

php php 4.3.10

php php 4.2.1

php php 5.0.2

php php 4.2

php php 4.3.8

php php 4.3.5

Vendor Advisories

Eric Romang discovered a local Denial of Service vulnerability in the handling of the ‘sessionsave_path’ parameter in PHP’s Apache 20 module By setting this parameter to an invalid value in an htaccess file, a local user could crash the Apache server (CVE-2005-3319) ...
Synopsis php security update Type/Severity Security Advisory: Moderate Topic Updated PHP packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 21This update has been rated as having moderate security impact by the RedHat Security Response Team Description ...
Synopsis php security update Type/Severity Security Advisory: Moderate Topic Updated PHP packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 3 and 4This update has been rated as having moderate security impact by the RedHat Security Response Team Description ...
Debian Bug report logs - #336645 PHP 441 fixes security bugs Package: php4; Maintainer for php4 is (unknown); Reported by: Florian Weimer <fw@denebenyode> Date: Mon, 31 Oct 2005 19:48:02 UTC Severity: grave Tags: security Found in version php4/4:4310-16 Fixed in version php4/4:442-1 Done: Adam Conrad <adconrad ...
Debian Bug report logs - #336004 CVE-2005-3319: mod_php DoS through sessionsave_path option Package: php4; Maintainer for php4 is (unknown); Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 27 Oct 2005 10:48:02 UTC Severity: important Tags: security Found in version php4/4:440-4 Fixed in version php4/4:442 ...

Exploits

source: wwwsecurityfocuscom/bid/15248/info PHP is prone to a cross-site scripting vulnerability This issue is due to a failure in the application to properly sanitize user-supplied input An attacker may leverage this issue to have arbitrary script code execute in the browser of an unsuspecting user in the context of the affected site ...

References

NVD-CWE-Otherhttp://www.hardened-php.net/advisory_182005.77.htmlhttp://www.php.net/release_4_4_1.phphttp://www.securityfocus.com/bid/15248http://secunia.com/advisories/17371http://securitytracker.com/id?1015130http://www.gentoo.org/security/en/glsa/glsa-200511-08.xmlhttp://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.htmlhttp://www.openpkg.org/security/OpenPKG-SA-2005.027-php.htmlhttp://secunia.com/advisories/18198http://secunia.com/advisories/17559http://www.redhat.com/support/errata/RHSA-2005-831.htmlhttp://www.redhat.com/support/errata/RHSA-2005-838.htmlhttp://secunia.com/advisories/17490http://secunia.com/advisories/17510http://secunia.com/advisories/17531http://secunia.com/advisories/17557http://support.avaya.com/elmodocs2/security/ASA-2006-037.htmhttp://secunia.com/advisories/18669http://www.novell.com/linux/security/advisories/2005_27_sr.htmlhttp://secunia.com/advisories/21252http://rhn.redhat.com/errata/RHSA-2006-0549.htmlhttp://secunia.com/advisories/22691http://www.turbolinux.com/security/2006/TLSA-2006-38.txthttp://www.mandriva.com/security/advisories?name=MDKSA-2005:213http://securityreason.com/securityalert/133http://www.vupen.com/english/advisories/2005/2254http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522http://www.vupen.com/english/advisories/2006/4320https://www.ubuntu.com/usn/usn-232-1/https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10542http://www.securityfocus.com/archive/1/415292https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PIRZJHM6UDNWNHZ3PCMEZ2YUK3CWY2UE/https://usn.ubuntu.com/232-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/26442/