PHP before 4.3.7 on Win32 platforms does not properly filter all shell metacharacters, which allows local or remote attackers to execute arbitrary code, overwrite files, and access internal environment variables via (1) the "%", "|", or ">" characters to the escapeshellcmd function, or (2) the "%" character to the escapeshellarg function.
References
Link Resource
http://www.idefense.com/application/poi/display?id=108 Not Applicable
http://www.php.net/release_4_3_7.php Patch Release Notes Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/16331 Third Party Advisory VDB Entry
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2004-06-10T04:00:00

Updated: 2017-07-10T14:57:01

Reserved: 2004-06-08T00:00:00


Link: CVE-2004-0542

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2004-08-06T04:00:00.000

Modified: 2022-07-01T14:14:12.260


Link: CVE-2004-0542

JSON object: View

cve-icon Redhat Information

No data.