4.3
CVSSv2

CVE-2006-0996

Published: 10/04/2006 Updated: 11/10/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Cross-site scripting (XSS) vulnerability in phpinfo (info.c) in PHP 5.1.2 and 4.4.2 allows remote malicious users to inject arbitrary web script or HTML via long array variables, including (1) a large number of dimensions or (2) long values, which prevents HTML tags from being removed.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.4.2

php php 5.1.2

Vendor Advisories

Debian Bug report logs - #361853 [CVE-2006-0996] phpinfo() Cross Site Scripting Package: php4; Maintainer for php4 is (unknown); Reported by: Oliver Paulus <oliver@code-projectorg> Date: Mon, 10 Apr 2006 19:33:06 UTC Severity: important Tags: security Found in versions php4/4:4310-16, 4:442-11 Done: sean finney &lt ...
The phpinfo() PHP function did not properly sanitize long strings A remote attacker could use this to perform cross-site scripting attacks against sites that have publicly-available PHP scripts that call phpinfo() Please note that it is not recommended to publicly expose phpinfo() (CVE-2006-0996) ...

Exploits

source: wwwsecurityfocuscom/bid/17362/info PHP is prone to a cross-site scripting vulnerability This issue is due to a failure in the application to properly sanitize user-supplied input An attacker may leverage this issue to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site ...

References

CWE-79http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.chttp://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c?r1=1.260&r2=1.261http://www.securityfocus.com/bid/17362http://securityreason.com/achievement_securityalert/34http://securitytracker.com/id?1015879http://secunia.com/advisories/19599http://rhn.redhat.com/errata/RHSA-2006-0276.htmlhttp://secunia.com/advisories/19832http://www.redhat.com/support/errata/RHSA-2006-0501.htmlhttp://secunia.com/advisories/20222http://www.novell.com/linux/security/advisories/05-05-2006.htmlhttp://security.gentoo.org/glsa/glsa-200605-08.xmlhttp://support.avaya.com/elmodocs2/security/ASA-2006-129.htmhttp://secunia.com/advisories/20951http://www.ubuntu.com/usn/usn-320-1http://secunia.com/advisories/21252http://www.php.net/ChangeLog-4.php#4.4.3http://www.osvdb.org/24484http://support.avaya.com/elmodocs2/security/ASA-2006-160.htmhttp://secunia.com/advisories/21564http://rhn.redhat.com/errata/RHSA-2006-0549.htmlftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.aschttp://secunia.com/advisories/19775http://secunia.com/advisories/19979http://secunia.com/advisories/20052http://secunia.com/advisories/20210http://secunia.com/advisories/21125http://www.mandriva.com/security/advisories?name=MDKSA-2006:074http://securityreason.com/securityalert/675http://www.vupen.com/english/advisories/2006/1290http://www.vupen.com/english/advisories/2006/2685http://marc.info/?l=php-cvs&m=114374620416389&w=2https://exchange.xforce.ibmcloud.com/vulnerabilities/25702https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10997https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=361853https://usn.ubuntu.com/320-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/27564/