7.5
CVSSv2

CVE-2007-1700

Published: 27/03/2007 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The session extension in PHP 4 prior to 4.4.5, and PHP 5 prior to 5.2.1, calculates the reference count for the session variables without considering the internal pointer from the session globals, which allows context-dependent malicious users to execute arbitrary code via a crafted string in the session_register after unsetting HTTP_SESSION_VARS and _SESSION, which destroys the session data Hashtable.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0.0

php php 4.0.1

php php 4.0.4

php php 4.0.5

php php 4.0

php php 4.2.0

php php 4.2.1

php php 4.3.11

php php 4.3.2

php php 4.4.0

php php 4.4.1

php php 5.0.0

php php 5.0.4

php php 5.0.5

php php 5.0

php php 5.1.3

php php 5.1.4

php php 4.0.3

php php 4.1.1

php php 4.1.2

php php 4.3.1

php php 4.3.10

php php 4.3.8

php php 4.3.9

php php 5.0.2

php php 5.0.3

php php 5.1.1

php php 5.1.2

php php 4.0.2

php php 4.0.7

php php 4.1.0

php php 4.2

php php 4.3.0

php php 4.3.6

php php 4.3.7

php php 4.4.4

php php 5.0.1

php php 5.1.0

php php 5.2.0

php php 4.0.6

php php 4.2.2

php php 4.2.3

php php 4.3.3

php php 4.3.4

php php 4.3.5

php php 4.4.2

php php 4.4.3

php php 5.1.5

php php 5.1.6

Vendor Advisories

Stefan Esser discovered multiple vulnerabilities in the “Month of PHP bugs” ...
Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language, which may lead to the execution of arbitrary code The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-1286 Stefan Esser discovered an overflow in the object reference handling code of the un ...

Exploits

<?php //////////////////////////////////////////////////////////////////////// // _ _ _ _ ___ _ _ ___ // // | || | __ _ _ _ __| | ___ _ _ ___ __| | ___ | _ \| || || _ \ // // | __ |/ _` || '_|/ _` |/ -_)| ' \ / -_)/ _` ||___|| _/| __ || _/ // // |_||_|\__,_||_| \__,_|\___||_||_|\_ ...