#VU32501 Input validation error in PHP - CVE-2014-5120
Published: August 23, 2014 / Updated: July 28, 2020
PHP
PHP Group
Description
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
gd_ctx.c in the GD component in PHP 5.4.x before 5.4.32 and 5.5.x before 5.5.16 does not ensure that pathnames lack %00 sequences, which might allow remote attackers to overwrite arbitrary files via crafted input to an application that calls the (1) imagegd, (2) imagegd2, (3) imagegif, (4) imagejpeg, (5) imagepng, (6) imagewbmp, or (7) imagewebp function.
Remediation
External links
- http://lists.apple.com/archives/security-announce/2015/Apr/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2014-09/msg00024.html
- http://php.net/ChangeLog-5.php
- http://rhn.redhat.com/errata/RHSA-2014-1327.html
- http://rhn.redhat.com/errata/RHSA-2014-1765.html
- http://rhn.redhat.com/errata/RHSA-2014-1766.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2015-2370101.html
- https://bugs.php.net/bug.php?id=67730
- https://support.apple.com/HT204659