NULL byte injection vulnerability in PHP by using a safe file extension after a character (Mac OS X)
|ID: oval:org.secpod.oval:def:3032||Date: (C)2011-11-15 (M)2020-03-27|
|Class: VULNERABILITY||Family: macos|
The host is installed with PHP 5.3.4 and is prone to a null byte injection vulnerability. A flaw is present in the application, which accepts the \0 character in a pathname. Successful exploitation could allow attackers to bypass intended access restrictions.
|Apple Mac OS X 10.6|
|Apple Mac OS X Server 10.6|