结构: Simple
Abstraction: Variant
状态: Incomplete
被利用可能性: unkown
The PHP application uses an old method for processing uploaded files by referencing the four global variables that are set for each file (e.g. $varname, $varname_size, $varname_name, $varname_type). These variables could be overwritten by attackers, causing the application to process unauthorized files.
These global variables could be overwritten by POST requests, cookies, or other methods of populating or overwriting these variables. This could be used to read or process arbitrary files by providing values such as "/etc/passwd".
cwe_Nature: ChildOf cwe_CWE_ID: 345 cwe_View_ID: 1000 cwe_Ordinal: Primary
cwe_Nature: PeerOf cwe_CWE_ID: 473 cwe_View_ID: 1000
Language: {'cwe_Name': 'PHP', 'cwe_Prevalence': 'Undetermined'}
范围 | 影响 | 注释 |
---|---|---|
['Confidentiality', 'Integrity'] | ['Read Files or Directories', 'Modify Files or Directories'] |
策略:
Use PHP 4 or later.
策略:
If you must support older PHP versions, write your own version of is_uploaded_file() and run it against $HTTP_POST_FILES['userfile']))
策略:
For later PHP versions, reference uploaded files using the $HTTP_POST_FILES or $_FILES variables, and use is_uploaded_file() or move_uploaded_file() to ensure that you are dealing with an uploaded file.
As of 2006, the "four globals" method is probably in sharp decline, but older PHP applications could have this issue.
In the "four globals" method, PHP sets the following 4 global variables (where "varname" is application-dependent):
bad PHP
"The global $_FILES exists as of PHP 4.1.0 (Use $HTTP_POST_FILES instead if using an earlier version). These arrays will contain all the uploaded file information."
bad PHP
** note: 'userfile' is the field name from the web form; this can vary.
标识 | 说明 | 链接 |
---|---|---|
CVE-2002-1460 | Forum does not properly verify whether a file was uploaded or if the associated variables were set by POST, allowing remote attackers to read arbitrary files. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1460 |
CVE-2002-1759 | Product doesn't check if the variables for an upload were set by uploading the file, or other methods such as $_POST. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1759 |
CVE-2002-1710 | Product does not distinguish uploaded file from other files. | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1710 |
映射的分类名 | ImNode ID | Fit | Mapped Node Name |
---|---|---|---|
PLOVER | Incomplete Identification of Uploaded File Variables (PHP) | ||
Software Fault Patterns | SFP25 | Tainted input to variable |