CVE编号
CVE-2006-0996利用情况
暂无补丁情况
N/A披露时间
2006-04-11漏洞描述
phpinfo (info.c)在PHP 5.1.2和4.4.2中的跨站点脚本(XSS)漏洞允许远程攻击者通过长数组变量(包括(1)大量维度或(2)长值)注入任意web脚本或HTML,从而阻止HTML标记被删除。解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接 |
|
---|---|
ftp://patches.sgi.com/support/free/security/advisories/20060501-01-U.asc | |
http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c | |
http://cvs.php.net/viewcvs.cgi/php-src/ext/standard/info.c?r1=1.260&r2=1.261 | |
http://marc.info/?l=php-cvs&m=114374620416389&w=2 | |
http://rhn.redhat.com/errata/RHSA-2006-0276.html | |
http://rhn.redhat.com/errata/RHSA-2006-0549.html | |
http://secunia.com/advisories/19599 | |
http://secunia.com/advisories/19775 | |
http://secunia.com/advisories/19832 | |
http://secunia.com/advisories/19979 | |
http://secunia.com/advisories/20052 | |
http://secunia.com/advisories/20210 | |
http://secunia.com/advisories/20222 | |
http://secunia.com/advisories/20951 | |
http://secunia.com/advisories/21125 | |
http://secunia.com/advisories/21252 | |
http://secunia.com/advisories/21564 | |
http://security.gentoo.org/glsa/glsa-200605-08.xml | |
http://securityreason.com/achievement_securityalert/34 | |
http://securityreason.com/securityalert/675 | |
http://securitytracker.com/id?1015879 | |
http://support.avaya.com/elmodocs2/security/ASA-2006-129.htm | |
http://support.avaya.com/elmodocs2/security/ASA-2006-160.htm | |
http://www.mandriva.com/security/advisories?name=MDKSA-2006:074 | |
http://www.novell.com/linux/security/advisories/05-05-2006.html | |
http://www.osvdb.org/24484 | |
http://www.php.net/ChangeLog-4.php#4.4.3 | |
http://www.redhat.com/support/errata/RHSA-2006-0501.html | |
http://www.securityfocus.com/bid/17362 | |
http://www.ubuntu.com/usn/usn-320-1 | |
http://www.vupen.com/english/advisories/2006/1290 | |
http://www.vupen.com/english/advisories/2006/2685 | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/25702 | |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova... |
受影响软件情况
# | 类型 | 厂商 | 产品 | 版本 | 影响面 | ||||
1 | |||||||||
---|---|---|---|---|---|---|---|---|---|
运行在以下环境 | |||||||||
应用 | php | php | 4.4.2 | - | |||||
运行在以下环境 | |||||||||
应用 | php | php | 5.1.2 | - | |||||
运行在以下环境 | |||||||||
系统 | suse_10 | php5-suhosin | * |
Up to (excluding) 5.1.2-29.35 |
- 攻击路径 网络
- 攻击复杂度 N/A
- 权限要求 无
- 影响范围 N/A
- 用户交互 需要
- 可用性 无
- 保密性 无
- 完整性 部分地
还没有评论,来说两句吧...