CVE-2012-1172

Publication date 23 May 2012

Last updated 24 July 2024


Ubuntu priority

The file-upload implementation in rfc1867.c in PHP before 5.4.0 does not properly handle invalid [ (open square bracket) characters in name values, which makes it easier for remote attackers to cause a denial of service (malformed $_FILES indexes) or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own filename restrictions.

Read the notes from the security team

Status

No maintained releases are affected by this CVE.

Package Ubuntu Release Status
php5 12.04 LTS precise
Fixed 5.3.10-1ubuntu3.2
11.10 oneiric
Fixed 5.3.6-13ubuntu3.8
11.04 natty
Fixed 5.3.5-1ubuntu7.10
10.10 maverick Ignored end of life
10.04 LTS lucid
Fixed 5.3.2-1ubuntu4.17
8.04 LTS hardy
Fixed 5.2.4-2ubuntu5.25

Notes


jdstrand

some argue bug is in script, not the language, but PHP does try to sanitize $_FILES. Script writers may be relying on that.