Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
PHP before 5.3.4 accepts the \0 character in a pathname, which might allow context-dependent attackers to bypass intended access restrictions by placing a safe file extension after this character, as demonstrated by .php\0.jpg at the end of the argument to the file_exists function.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
PHP绕过预设的访问限制漏洞
Vulnerability Description
PHP(PHP:Hypertext Preprocessor,PHP:超文本预处理器)是PHP Group和开放源代码社区共同维护的一种开源的通用计算机脚本语言。该语言主要用于Web开发,支持多种数据库及操作系统。 PHP 5.3.4之前版本接受了路径名称中的/0字符。上下文攻击者可以通过在该字符后放置安全文件扩展名,绕过预设的访问限制。该漏洞已经通过向file_exists函数传递的参数末端的.php\0.jpg得到证实。
CVSS Information
N/A
Vulnerability Type
N/A