5.8 Medium
CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:M/Au:N/C:N/I:P/A:P
0.025 Low
EPSS
Percentile
90.1%
The file-upload implementation in rfc1867.c in PHP before 5.4.0 does not
properly handle invalid [ (open square bracket) characters in name values,
which makes it easier for remote attackers to cause a denial of service
(malformed $_FILES indexes) or conduct directory traversal attacks during
multi-file uploads by leveraging a script that lacks its own filename
restrictions.
Author | Note |
---|---|
jdstrand | some argue bug is in script, not the language, but PHP does try to sanitize $_FILES. Script writers may be relying on that. |
www.openwall.com/lists/oss-security/2012/03/08/4
launchpad.net/bugs/cve/CVE-2012-1172
nealpoole.com/blog/2011/10/directory-traversal-via-php-multi-file-uploads/
nvd.nist.gov/vuln/detail/CVE-2012-1172
security-tracker.debian.org/tracker/CVE-2012-1172
ubuntu.com/security/notices/USN-1481-1
www.cve.org/CVERecord?id=CVE-2012-1172