7.5
CVSSv2

CVE-2005-3390

Published: 01/11/2005 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The RFC1867 file upload feature in PHP 4.x up to 4.4.0 and 5.x up to 5.0.5, when register_globals is enabled, allows remote malicious users to modify the GLOBALS array and bypass security protections of PHP applications via a multipart/form-data POST request with a "GLOBALS" fileupload field.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 3.0.14

php php 3.0.15

php php 3.0.5

php php 3.0.6

php php 4.0.2

php php 4.0.3

php php 4.0.7

php php 4.2.3

php php 4.2

php php 4.3.5

php php 4.3.6

php php 5.0.2

php php 5.0.3

php php 3.0

php php 3.0.1

php php 3.0.16

php php 3.0.17

php php 3.0.7

php php 3.0.8

php php 4.0.4

php php 4.1.0

php php 4.1.1

php php 4.3.0

php php 4.3.1

php php 4.3.7

php php 4.3.8

php php 5.0.4

php php 5.0.5

php php 3.0.10

php php 3.0.11

php php 3.0.18

php php 3.0.2

php php 3.0.9

php php 4.0.0

php php 4.0.5

php php 4.0.6

php php 4.1.2

php php 4.2.0

php php 4.3.10

php php 3.0.12

php php 3.0.13

php php 3.0.3

php php 3.0.4

php php 4.0.1

php php 4.2.1

php php 4.2.2

php php 4.3.3

php php 4.3.4

php php 5.0.0

php php 5.0.1

php php 5.0

php php 4.3.11

php php 4.3.2

php php 4.3.9

php php 4.4.0

Vendor Advisories

Eric Romang discovered a local Denial of Service vulnerability in the handling of the ‘sessionsave_path’ parameter in PHP’s Apache 20 module By setting this parameter to an invalid value in an htaccess file, a local user could crash the Apache server (CVE-2005-3319) ...
Synopsis php security update Type/Severity Security Advisory: Moderate Topic Updated PHP packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 21This update has been rated as having moderate security impact by the RedHat Security Response Team Description ...
Synopsis php security update Type/Severity Security Advisory: Moderate Topic Updated PHP packages that fix multiple security issues are now availablefor Red Hat Enterprise Linux 3 and 4This update has been rated as having moderate security impact by the RedHat Security Response Team Description ...
Debian Bug report logs - #336654 PHP 505 contains unfixed security bugs Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Florian Weimer <fw@denebenyode> Date: Mon, 31 Oct 2005 20:48:02 UTC Severity ...
Debian Bug report logs - #336645 PHP 441 fixes security bugs Package: php4; Maintainer for php4 is (unknown); Reported by: Florian Weimer <fw@denebenyode> Date: Mon, 31 Oct 2005 19:48:02 UTC Severity: grave Tags: security Found in version php4/4:4310-16 Fixed in version php4/4:442-1 Done: Adam Conrad <adconrad ...
Debian Bug report logs - #341368 CVE-2005-3883: Injection of arbitrary values into the To:-header of the md_send_mail() function Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Moritz Muehlenhoff <jmm@inuti ...
Debian Bug report logs - #336004 CVE-2005-3319: mod_php DoS through sessionsave_path option Package: php4; Maintainer for php4 is (unknown); Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 27 Oct 2005 10:48:02 UTC Severity: important Tags: security Found in version php4/4:440-4 Fixed in version php4/4:442 ...

Exploits

source: wwwsecurityfocuscom/bid/15250/info PHP is prone to a vulnerability that allows attackers to overwrite the GLOBAL variable via HTTP POST requests By exploiting this issue, remote attackers may be able to overwrite the GLOBAL variable This may allow attackers to further exploit latent vulnerabilities in PHP scripts #!/usr/bin/p ...

References

NVD-CWE-Otherhttp://www.hardened-php.net/advisory_202005.79.htmlhttp://www.hardened-php.net/globals-problemhttp://www.php.net/release_4_4_1.phphttp://www.securityfocus.com/bid/15250http://secunia.com/advisories/17371http://securitytracker.com/id?1015129http://www.gentoo.org/security/en/glsa/glsa-200511-08.xmlhttp://www.fedoralegacy.org/updates/FC2/2005-11-28-FLSA_2005_166943__Updated_php_packages_fix_security_issues.htmlhttp://www.openpkg.org/security/OpenPKG-SA-2005.027-php.htmlhttp://secunia.com/advisories/18054http://secunia.com/advisories/18198http://secunia.com/advisories/17559http://www.redhat.com/support/errata/RHSA-2005-831.htmlhttp://www.redhat.com/support/errata/RHSA-2005-838.htmlhttp://secunia.com/advisories/17490http://secunia.com/advisories/17510http://secunia.com/advisories/17531http://secunia.com/advisories/17557http://support.avaya.com/elmodocs2/security/ASA-2006-037.htmhttp://secunia.com/advisories/18669http://www.novell.com/linux/security/advisories/2005_27_sr.htmlhttp://secunia.com/advisories/21252http://rhn.redhat.com/errata/RHSA-2006-0549.htmlhttp://secunia.com/advisories/22691http://www.mandriva.com/security/advisories?name=MDKSA-2005:213http://securityreason.com/securityalert/132http://www.vupen.com/english/advisories/2005/2254http://itrc.hp.com/service/cki/docDisplay.do?docId=c00786522http://www.vupen.com/english/advisories/2006/4320https://www.ubuntu.com/usn/usn-232-1/https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10537http://www.securityfocus.com/archive/1/419504/100/0/threadedhttp://www.securityfocus.com/archive/1/415290/30/0/threadedhttps://usn.ubuntu.com/232-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/26443/