CVE-2015-2348
Published: 30 March 2015
The move_uploaded_file implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
Notes
Author | Note |
---|---|
mdeslaur |
fixed in lucid's php5-CVE-2006-7243.patch, and is fixed in precise also. Seems to be a regression in 5.4+ |
Priority
Status
Package | Release | Status |
---|---|---|
php5
Launchpad, Ubuntu, Debian |
lucid |
Not vulnerable
(5.3.2-1ubuntu4.29)
|
precise |
Not vulnerable
(5.3.10-1ubuntu3.17)
|
|
trusty |
Released
(5.5.9+dfsg-1ubuntu4.9)
|
|
upstream |
Released
(5.6.7)
|
|
utopic |
Released
(5.5.12+dfsg-2ubuntu4.4)
|
|
Patches:
upstream: http://git.php.net/?p=php-src.git;a=commit;h=1291d6bbee93b6109eb07e8f7916ff1b7fcc13e1 |