The moveuploadedfile implementation in ext/standard/basic_functions.c in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 truncates a pathname upon encountering a \x00 character, which allows remote attackers to bypass intended extension restrictions and create files with unexpected names via a crafted second argument. NOTE: this vulnerability exists because of an incomplete fix for CVE-2006-7243.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "php5-gd": "5.5.9+dfsg-1ubuntu4.9", "libphp5-embed": "5.5.9+dfsg-1ubuntu4.9", "php5-mysqlnd": "5.5.9+dfsg-1ubuntu4.9", "php5-dbg": "5.5.9+dfsg-1ubuntu4.9", "php-pear": "5.5.9+dfsg-1ubuntu4.9", "php5-cli": "5.5.9+dfsg-1ubuntu4.9", "php5-fpm": "5.5.9+dfsg-1ubuntu4.9", "php5-pspell": "5.5.9+dfsg-1ubuntu4.9", "php5-mysql": "5.5.9+dfsg-1ubuntu4.9", "php5-curl": "5.5.9+dfsg-1ubuntu4.9", "php5-ldap": "5.5.9+dfsg-1ubuntu4.9", "php5-pgsql": "5.5.9+dfsg-1ubuntu4.9", "php5-xsl": "5.5.9+dfsg-1ubuntu4.9", "php5-readline": "5.5.9+dfsg-1ubuntu4.9", "php5-common": "5.5.9+dfsg-1ubuntu4.9", "php5-enchant": "5.5.9+dfsg-1ubuntu4.9", "php5-dev": "5.5.9+dfsg-1ubuntu4.9", "libapache2-mod-php5filter": "5.5.9+dfsg-1ubuntu4.9", "php5": "5.5.9+dfsg-1ubuntu4.9", "php5-sybase": "5.5.9+dfsg-1ubuntu4.9", "php5-gmp": "5.5.9+dfsg-1ubuntu4.9", "php5-odbc": "5.5.9+dfsg-1ubuntu4.9", "php5-cgi": "5.5.9+dfsg-1ubuntu4.9", "php5-recode": "5.5.9+dfsg-1ubuntu4.9", "libapache2-mod-php5": "5.5.9+dfsg-1ubuntu4.9", "php5-snmp": "5.5.9+dfsg-1ubuntu4.9", "php5-sqlite": "5.5.9+dfsg-1ubuntu4.9", "php5-intl": "5.5.9+dfsg-1ubuntu4.9", "php5-xmlrpc": "5.5.9+dfsg-1ubuntu4.9", "php5-tidy": "5.5.9+dfsg-1ubuntu4.9" } ] }