PHP com_print_typeinfo Remote Code Execution Vulnerability
Last Update Date:
7 Jun 2013
Release Date:
22 May 2012
6221
Views
RISK: High Risk
TYPE: Security software and application - Security Software & Appliance
A vulnerability has been identified in PHP, which can be exploited by malicious people to compromise a vulnerable system.
- It is due to the vulnerability in the com_print_typeinfo function.
- The php engine needs to execute the malicious code, which can include any shellcode like the the ones that bind a shell to a port.
- An exploit would require the attacker to upload PHP code to the server, at which point, the attacker could just use PHP to run shell commands via "exec".
- Only the windows version is vulnerable.
NOTE: No patch available for this vulnerability
Impact
- Remote Code Execution
System / Technologies affected
- PHP Version 5.4.3 and earlier in Windows
Solutions
- No patch available for this vulnerability
- Workaround:
- Block any file upload function in your php applications to avoid risks of exploit code execution.
- Use your IPS to filter known shellcodes like the ones included in metasploit.
- Keep PHP in the current available version, so you can know that you are not a possible target for any other vulnerability like CVE-2012-2336 registered at the beginning of the month.
- Use your HIPS to block any possible buffer overflow in your system.
Vulnerability Identifier
Source
Related Link
Share with