4.3
CVSSv2

CVE-2007-3799

Published: 16/07/2007 Updated: 03/10/2018
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 435
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to 5.2.3 allows remote malicious users to insert arbitrary attributes into the session cookie via special characters in a cookie that is obtained from (1) PATH_INFO, (2) the session_id function, and (3) the session_start function, which are not encoded or filtered when the new session cookie is generated, a related issue to CVE-2006-0207.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.3.10

php php 4.3.1

php php 4.2.1

php php 4.2.0

php php 4.3.9

php php 4.4.0

php php 4.0.1

php php 4.0.0

php php 4.0.3

php php 4.0.2

php php 4.3.2

php php 4.3.11

php php 4.2.3

php php 4.2.2

php php 4.4.1

php php 4.4.2

php php 4.0

php php 4.1.2

php php 4.1.1

php php 4.1.0

php php 4.3.4

php php 4.3.3

php php 4.4.5

php php 4.4.6

php php 4.3.0

php php 4.4.3

php php 4.4.4

php php 4.0.6

php php 4.0.7

php php 4.4.7

php php 4.3.6

php php 4.3.5

php php 4.3.7

php php 4.3.8

php php 4.0.5

php php 4.0.4

php php 5.0.0

php php 5.1.1

php php 5.1.0

php php 5.2.12

php php 5.2.14

php php 5.2.1

php php 5.2.11

php php 5.0.5

php php 5.2.13

php php 5.1.6

php php 5.2.2

php php 5.0.4

php php 5.0.3

php php 5.2.0

php php 5.1.4

php php 5.2.10

php php 5.1.3

php php 5.1.2

php php 5.0.2

php php 5.0.1

php php 5.1.5

php php 5.2.3

Vendor Advisories

Debian Bug report logs - #441433 CVE-2007-3806, CVE-2007-2519 and CVE-2007-3799 Package: php5; Maintainer for php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5 is src:php5 (PTS, buildd, popcon) Reported by: Nico Golde <nion@debianorg> Date: Sun, 9 Sep 2007 19:30:02 UTC Severit ...
Several vulnerabilities have been discovered in PHP version 4, a server-side, HTML-embedded scripting language The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2007-3799 The session_start function allows remote attackers to insert arbitrary attributes into the session cookie via special characters ...
It was discovered that the patch for CVE-2007-4659 could lead to regressions in some scenarios The fix has been reverted for now, a revised update will be provided in a future PHP DSA For reference the original advisory below: Several remote vulnerabilities have been discovered in PHP, a server-side, HTML-embedded scripting language The Common ...
USN-549-1 fixed vulnerabilities in PHP However, some upstream changes were incomplete, which caused crashes in certain situations with Ubuntu 710 This update fixes the problem ...
It was discovered that the wordwrap function did not correctly check lengths Remote attackers could exploit this to cause a crash or monopolize CPU resources, resulting in a denial of service (CVE-2007-3998) ...

Exploits

source: wwwsecurityfocuscom/bid/24268/info PHP is prone to an HTTP-response-header-injection vulnerability because it fails to sanitize user-supplied input An attacker can exploit this issue to inject additional cookie attributes into session cookies This may lead to other attacks This issue affects PHP 523 (and prior versions) and ...

References

CWE-20http://www.php-security.org/MOPB/PMOPB-46-2007.htmlhttps://issues.rpath.com/browse/RPL-1693http://support.avaya.com/elmodocs2/security/ASA-2007-449.htmhttps://launchpad.net/bugs/173043https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00354.htmlhttp://www.mandriva.com/security/advisories?name=MDKSA-2007:187http://www.redhat.com/support/errata/RHSA-2007-0890.htmlhttp://rhn.redhat.com/errata/RHSA-2007-0889.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0888.htmlhttp://www.redhat.com/support/errata/RHSA-2007-0891.htmlhttp://www.novell.com/linux/security/advisories/2007_15_sr.htmlhttp://www.ubuntu.com/usn/usn-549-2http://www.securityfocus.com/bid/24268http://secunia.com/advisories/26930http://secunia.com/advisories/26871http://secunia.com/advisories/26895http://secunia.com/advisories/26967http://secunia.com/advisories/27351http://secunia.com/advisories/27377http://secunia.com/advisories/27545http://secunia.com/advisories/27864http://www.debian.org/security/2008/dsa-1444http://secunia.com/advisories/28249http://docs.info.apple.com/article.html?artnum=307562http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.htmlhttp://secunia.com/advisories/29420http://www.debian.org/security/2008/dsa-1578http://secunia.com/advisories/30288http://www.vupen.com/english/advisories/2008/0924/referenceshttp://osvdb.org/36855https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9792https://usn.ubuntu.com/549-1/https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=441433https://nvd.nist.govhttps://usn.ubuntu.com/549-2/https://www.exploit-db.com/exploits/30130/https://www.debian.org/security/./dsa-1578