Description
php_variables.c in PHP before 5.0.2 allows remote attackers to read sensitive memory contents via (1) GET, (2) POST, or (3) COOKIE GPC variables that end in an open bracket character, which causes PHP to calculate an incorrect string length.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Stefano Di Paola · textremotephp
https://www.exploit-db.com/exploits/24656
References (8)
Core 8
Core References
Third Party Advisory mailing-list
x_refsource_vulnwatch
http://archives.neohapsis.com/archives/vulnwatch/2004-q3/0053.html
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=109527531130492&w=2
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/12560/
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1011279
Issue Tracking vendor-advisory
x_refsource_fedora
https://bugzilla.fedora.us/show_bug.cgi?id=2344
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/17393
Third Party Advisory, VDB Entry vdb-entry
signature
x_refsource_oval
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10863
Patch, Vendor Advisory vendor-advisory
x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2004-687.html
Scores
EPSS
0.0834
EPSS Percentile
92.3%
Details
Status
published
Products (1)
php/php
< 5.0.2
Published
Nov 03, 2004
Tracked Since
Feb 18, 2026