- Description
- The addslashes function in PHP 4.3.9 does not properly escape a NULL (/0) character, which may allow remote attackers to read arbitrary files in PHP applications that contain a directory traversal vulnerability in require or include statements, but are otherwise protected by the magic_quotes_gpc mechanism. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:N/A:N
- Hype score
- Not currently trending
- Red HatRed Hat does not consider this issue to be a security vulnerability since no trust boundary is crossed. There are no known uses of this function which could allow a remote attacker to execute arbitrary code.
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "57B71BB7-5239-4860-9100-8CABC3992D8C"
},
{
"criteria": "cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "72BD447A-4EED-482C-8F61-48FAD4FCF8BA"
},
{
"criteria": "cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B3F9DF9D-15E5-4387-ABE3-A7583331A928"
},
{
"criteria": "cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "11579E5C-D7CF-46EE-B015-5F4185C174E7"
},
{
"criteria": "cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0F9D7662-A5B6-41D0-B6A1-E5ABC5ABA47F"
},
{
"criteria": "cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "E3797AB5-9E49-4251-A212-B6E5D9996764"
},
{
"criteria": "cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D61D9CE9-F7A3-4F52-9D4E-B2473804ECB7"
},
{
"criteria": "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7007E77F-60EF-44D8-9676-15B59DF1325F"
},
{
"criteria": "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B"
},
{
"criteria": "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "74E7AE59-1CB0-4300-BBE0-109F909789EF"
}
],
"operator": "OR"
}
]
}
]