5
CVSSv2

CVE-2006-4023

Published: 09/08/2006 Updated: 17/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The ip2long function in PHP 5.1.4 and previous versions may incorrectly validate an arbitrary string and return a valid network IP address, which allows remote malicious users to obtain network information and facilitate other attacks, as demonstrated using SQL injection in the X-FORWARDED-FOR Header in index.php in MiniBB 2.0. NOTE: it could be argued that the ip2long behavior represents a risk for security-relevant issues in a way that is similar to strcpy's role in buffer overflows, in which case this would be a class of implementation bugs that would require separate CVE items for each PHP application that uses ip2long in a security-relevant manner.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.1.4

php php 4.3.3

php php 5.0.2

Vendor Advisories

Debian Bug report logs - #382257 CVE-2006-4023: php ip2long function incorrect address validation Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Stefan Fritsch <sf@sfritschde> Date: Wed, 9 Aug 2006 ...