NULL byte injection vulnerability in PHP by using a safe file extension after a character (Mac OS X)ID: oval:org.secpod.oval:def:3032 | Date: (C)2011-11-15 (M)2024-02-19 |
Class: VULNERABILITY | Family: macos |
The host is installed with PHP 5.3.4 and is prone to a null byte injection vulnerability. A flaw is present in the application, which accepts the \0 character in a pathname. Successful exploitation could allow attackers to bypass intended access restrictions.
Platform: |
Apple Mac OS X 10.6 |
Apple Mac OS X Server 10.6 |