Executive Summary
Informations | |||
---|---|---|---|
Name | CVE-2004-1020 | First vendor Publication | 2005-01-10 |
Vendor | Cve | Last vendor Modification | 2024-11-20 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:N/A:N) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The addslashes function in PHP 4.3.9 does not properly escape a NULL (/0) character, which may allow remote attackers to read arbitrary files in PHP applications that contain a directory traversal vulnerability in require or include statements, but are otherwise protected by the magic_quotes_gpc mechanism. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion. |
Original Source
Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-1020 |
CPE : Common Platform Enumeration
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
12600 | PHP addslashes() NULL Byte Bypass PHP contains a flaw that may allow remote attackers to gain access to privileged files. The issue is due to the addslashes function not properly escaping NULL characters. By supplying crafted input, an attacker can use require or include statements to traverse the filesystem and access arbitrary files. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2005-02-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2005-032.nasl - Type : ACT_GATHER_INFO |
2005-01-26 | Name : The remote host is missing a Mac OS X update that fixes a security issue. File : macosx_SecUpd2005-001.nasl - Type : ACT_GATHER_INFO |
2004-12-19 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200412-14.nasl - Type : ACT_GATHER_INFO |
2004-12-19 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2004-151.nasl - Type : ACT_GATHER_INFO |
2004-12-15 | Name : The remote web server uses a version of PHP that is potentially affected by m... File : php45_multiple_flaws.nasl - Type : ACT_GATHER_INFO |
Sources (Detail)
Alert History
Date | Informations |
---|---|
2024-11-28 23:22:34 |
|
2024-11-28 12:06:15 |
|
2024-08-02 12:02:53 |
|
2024-08-02 01:01:33 |
|
2024-02-02 01:02:38 |
|
2024-02-01 12:01:34 |
|
2023-09-05 12:02:31 |
|
2023-09-05 01:01:25 |
|
2023-09-02 12:02:32 |
|
2023-09-02 01:01:25 |
|
2023-08-12 12:03:04 |
|
2023-08-12 01:01:26 |
|
2023-08-11 12:02:38 |
|
2023-08-11 01:01:27 |
|
2023-08-06 12:02:26 |
|
2023-08-06 01:01:26 |
|
2023-08-04 12:02:30 |
|
2023-08-04 01:01:27 |
|
2023-07-14 12:02:29 |
|
2023-07-14 01:01:27 |
|
2023-03-29 01:02:30 |
|
2023-03-28 12:01:32 |
|
2022-10-11 12:02:13 |
|
2022-10-11 01:01:19 |
|
2021-05-04 12:02:26 |
|
2021-04-22 01:02:36 |
|
2020-05-23 00:15:56 |
|
2019-06-08 12:01:19 |
|
2017-07-11 12:01:33 |
|
2016-04-26 12:55:05 |
|
2014-02-17 10:28:19 |
|
2013-05-11 11:43:40 |
|