PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: mitre
Published: 2011-01-18T19:00:00
Updated: 2024-08-07T20:57:41.063Z
Reserved: 2010-12-09T00:00:00
Link: CVE-2006-7243
Vulnrichment
No data.
NVD
Status : Modified
Published: 2011-01-18T20:00:10.580
Modified: 2024-11-21T00:24:43.160
Link: CVE-2006-7243
Redhat