Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
The pcntl_exec implementation in PHP before 5.4.41, 5.5.x before 5.5.25, and 5.6.x before 5.6.9 truncates a pathname upon encountering a \x00 character, which might allow remote attackers to bypass intended extension restrictions and execute files with unexpected names via a crafted first argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
PHP pcntl_exec 安全漏洞
Vulnerability Description
PHP(PHP:Hypertext Preprocessor,PHP:超文本预处理器)是PHP Group和开放源代码社区共同维护的一种开源的通用计算机脚本语言。该语言主要用于Web开发,支持多种数据库及操作系统。 PHP的pcntl_exec实现过程中存在安全漏洞,该漏洞源于程序不允许路径名中存在空字节。远程攻击者可借助特制的‘first’参数利用该漏洞绕过既定的扩展限制,执行文件。以下版本受到影响:PHP 5.4.41之前版本,5.5.25之前5.5.x版本,5.6.9之前5.6.x版本。(注:该漏洞
CVSS Information
N/A
Vulnerability Type
N/A