Vulnerability Details : CVE-2007-3205
The parse_str function in (1) PHP, (2) Hardened-PHP, and (3) Suhosin, when called without a second parameter, might allow remote attackers to overwrite arbitrary variables by specifying variable names and values in the string to be parsed. NOTE: it is not clear whether this is a design limitation of the function or a bug in PHP, although it is likely to be regarded as a bug in Hardened-PHP and Suhosin.
Products affected by CVE-2007-3205
- cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
- cpe:2.3:a:hardened-php_project:hardened-php:*:*:*:*:*:*:*:*
- cpe:2.3:a:hardened-php_project:subhosin:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2007-3205
5.79%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 93 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2007-3205
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:P/A:N |
10.0
|
2.9
|
NIST |
Vendor statements for CVE-2007-3205
-
Red Hat 2007-06-26This is not a security vulnerability: it is the expected behaviour of parse_str when used without a second parameter.
References for CVE-2007-3205
-
http://www.securityfocus.com/archive/1/471275/100/0/threaded
-
http://securityreason.com/securityalert/2800
-
http://www.securityfocus.com/archive/1/471178/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/34836
-
http://www.securityfocus.com/archive/1/471204/100/0/threaded
-
http://www.acid-root.new.fr/advisories/14070612.txt
Jump to