header-logo
Suggest Exploit
vendor:
PHP
by:
Unknown

Multiple Remote File Inclusion Vulnerabilities in PHP4 and PHP5

The vulnerabilities in PHP4 and PHP5 allow remote attackers to carry out directory traversal attacks to disclose arbitrary files and upload files to arbitrary locations. This can be exploited by passing user-supplied data without proper sanitization.

Mitigation:

To mitigate these vulnerabilities, it is recommended to sanitize and validate user-supplied data before using it in PHP scripts. Additionally, file upload functionality should be restricted to specific directories and file types.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11981/info

PHP4 and PHP5 are reported prone to multiple remotely exploitable vulnerabilities. These issue result from insufficient sanitization of user-supplied data. A remote attacker may carry out directory traversal attacks to disclose arbitrary files and upload files to arbitrary locations.

It is reported that these vulnerabilities may only be exploited on Windows.


http://www.example.com/phpscript.php?whatever=../../../../boot.ini%00
http://www.example.com/phpscript.php?whatever=..\'file.ext