CVE-2012-1172
Published: 23 May 2012
The file-upload implementation in rfc1867.c in PHP before 5.4.0 does not properly handle invalid [ (open square bracket) characters in name values, which makes it easier for remote attackers to cause a denial of service (malformed $_FILES indexes) or conduct directory traversal attacks during multi-file uploads by leveraging a script that lacks its own filename restrictions.
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
hardy |
Released
(5.2.4-2ubuntu5.25)
|
lucid |
Released
(5.3.2-1ubuntu4.17)
|
|
maverick |
Ignored
(reached end-of-life)
|
|
natty |
Released
(5.3.5-1ubuntu7.10)
|
|
oneiric |
Released
(5.3.6-13ubuntu3.8)
|
|
precise |
Released
(5.3.10-1ubuntu3.2)
|
|
upstream |
Released
(5.3.11,5.4.0)
|
Notes
Author | Note |
---|---|
jdstrand | some argue bug is in script, not the language, but PHP does try to sanitize $_FILES. Script writers may be relying on that. |
References
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-1172
- http://www.openwall.com/lists/oss-security/2012/03/08/4
- https://nealpoole.com/blog/2011/10/directory-traversal-via-php-multi-file-uploads/
- https://ubuntu.com/security/notices/USN-1481-1
- NVD
- Launchpad
- Debian