Vulnerability Details : CVE-2010-2531
The var_export function in PHP 5.2 before 5.2.14 and 5.3 before 5.3.3 flushes the output buffer to the user when certain fatal errors occur, even if display_errors is off, which allows remote attackers to obtain sensitive information by causing the application to exceed limits for memory, execution time, or recursion.
Vulnerability category: Information leak
Threat overview for CVE-2010-2531
Top countries where our scanners detected CVE-2010-2531
Top open port discovered on systems with this issue
80
IPs affected by CVE-2010-2531 51,958
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2010-2531!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2010-2531
Probability of exploitation activity in the next 30 days: 1.84%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 87 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2010-2531
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
4.3
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:N/A:N |
8.6
|
2.9
|
NIST |
CWE ids for CVE-2010-2531
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-2531
-
http://www.redhat.com/support/errata/RHSA-2010-0919.html
SupportThird Party Advisory
-
http://marc.info/?l=bugtraq&m=133469208622507&w=2
'[security bulletin] HPSBOV02763 SSRT100826 rev.1 - HP Secure Web Server (SWS) for OpenVMS running PH' - MARCMailing List;Third Party Advisory
-
http://marc.info/?l=bugtraq&m=130331363227777&w=2
'[security bulletin] HPSBMA02662 SSRT100409 rev.1 - HP System Management Homepage (SMH) for Linux and' - MARCMailing List;Third Party Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2010-10/msg00000.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:018Mailing List;Third Party Advisory
-
http://lists.apple.com/archives/security-announce/2010//Nov/msg00000.html
Apple - Lists.apple.comMailing List;Third Party Advisory
-
https://bugzilla.redhat.com/show_bug.cgi?id=617673
617673 – (CVE-2010-2531) CVE-2010-2531 php: information leak vulnerability in var_export()Issue Tracking;Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2010/07/16/3
oss-security - Re: Re: CVE request, php var_exportMailing List;Third Party Advisory
-
http://www.php.net/archive/2010.php#id2010-07-22-1
PHP: News Archive - 2010Vendor Advisory
-
http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html
Apple - Lists.apple.comMailing List;Third Party Advisory
-
http://www.php.net/archive/2010.php#id2010-07-22-2
PHP: News Archive - 2010Vendor Advisory
-
http://support.apple.com/kb/HT4435
We're sorry.Third Party Advisory
-
http://svn.php.net/viewvc/php/php-src/trunk/ext/standard/tests/general_functions/var_export_error2.phpt?view=log&pathrev=301143
PHP: Log of /php/php-src/trunk/ext/standard/tests/general_functions/var_export_error2.phptVendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2010:017Mailing List;Third Party Advisory
-
http://support.apple.com/kb/HT4312
About Security Update 2010-005 - Apple SupportThird Party Advisory
-
http://www.vupen.com/english/advisories/2010/3081
Webmail | OVH- OVHPermissions Required
-
http://www.debian.org/security/2011/dsa-2266
Debian -- Security Information -- DSA-2266-1 php5Third Party Advisory
-
http://www.openwall.com/lists/oss-security/2010/07/13/1
oss-security - CVE request, php var_exportMailing List;Third Party Advisory
Products affected by CVE-2010-2531
- cpe:2.3:o:debian:debian_linux:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:debian:debian_linux:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*