Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12022
HistoryMar 29, 2006 - 12:00 a.m.

[SA19383] PHP "html_entity_decode()" Information Disclosure Vulnerability

2006-03-2900:00:00
vulners.com
35

TITLE:
PHP "html_entity_decode()" Information Disclosure Vulnerability

SECUNIA ADVISORY ID:
SA19383

VERIFY ADVISORY:
http://secunia.com/advisories/19383/

CRITICAL:
Less critical

IMPACT:
Exposure of sensitive information

WHERE:
>From remote

SOFTWARE:
PHP 4.3.x
http://secunia.com/product/922/
PHP 4.4.x
http://secunia.com/product/5768/
PHP 5.0.x
http://secunia.com/product/3919/
PHP 5.1.x
http://secunia.com/product/6796/

DESCRIPTION:
A vulnerability has been discovered in PHP, which can be exploited by
malicious people to gain knowledge of potentially sensitive
information.

The vulnerability is caused due to the "html_entity_decode()" PHP
function not being binary safe. This can be exploited to disclose
certain part of the memory via a script calling the
"html_entity_decode()" function with input controlled by the attacker
and where the result is sent to the attacker.

Successful may allow disclosure of e.g. passwords stored in a PHP
script.

The vulnerability has been confirmed in versions 4.4.2 and 5.1.2.
Prior versions may also be affected.

SOLUTION:
The vulnerability has been fixed in the CVS repository and in version
5.1.3-RC1.

Do not call the "html_entity_decode()" function in PHP scripts where
the input originates from untrusted sources.

PROVIDED AND/OR DISCOVERED BY:
Discovered by the vendor and reported to public mailing lists by Tхnu
Samuel.

ORIGINAL ADVISORY:
Tхnu Samuel:
http://archives.neohapsis.com/archives/fulldisclosure/2006-03/1675.html


About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/

Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.