CVE编号
CVE-2007-1900利用情况
暂无补丁情况
N/A披露时间
2007-04-11漏洞描述
PHP 5.2.0和5.2.1的ext / filter中的FILTER_VALIDATE_EMAIL过滤器中的CRLF注入漏洞允许上下文相关的攻击者通过带有'\ n'字符的电子邮件地址注入任意电子邮件标题,从而导致常规表达式忽略地址字符串的后续部分。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 | |
http://secunia.com/advisories/24824 | |
http://secunia.com/advisories/25056 | |
http://secunia.com/advisories/25057 | |
http://secunia.com/advisories/25062 | |
http://secunia.com/advisories/25445 | |
http://secunia.com/advisories/25535 | |
http://secunia.com/advisories/26231 | |
http://secunia.com/advisories/27037 | |
http://secunia.com/advisories/27102 | |
http://secunia.com/advisories/27110 | |
http://security.gentoo.org/glsa/glsa-200705-19.xml | |
http://slackware.com/security/viewer.php?l=slackware-security&y=2007&m=slackw... | |
http://www.debian.org/security/2007/dsa-1283 | |
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml | |
http://www.novell.com/linux/security/advisories/2007_32_php.html | |
http://www.osvdb.org/33962 | |
http://www.php-security.org/MOPB/PMOPB-45-2007.html | |
http://www.php.net/releases/5_2_3.php | |
http://www.securityfocus.com/bid/23359 | |
http://www.trustix.org/errata/2007/0023/ | |
http://www.ubuntu.com/usn/usn-455-1 | |
http://www.vupen.com/english/advisories/2007/2016 | |
http://www.vupen.com/english/advisories/2007/3386 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/33510 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... | |
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | php | php | 5.2.0 | - | |||||
运行在以下环境 | |||||||||
应用 | php | php | 5.2.1 | - |
- 攻击路径 网络
- 攻击复杂度 低
- 权限要求 无
- 影响范围 N/A
- 用户交互 无
- 可用性 无
- 保密性 无
- 完整性 部分地
还没有评论,来说两句吧...