SB2023021351 - Multiple vulnerabilities in PHP
Published: February 13, 2023 Updated: June 8, 2025
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Cross-site scripting (CVE-ID: CVE-2010-3870)
The vulnerability allows a remote attacker to perform cross-site scripting (XSS) attacks.
The vulnerability exists due to insufficient sanitization of user-supplied data when processing data passed via a crafted string. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
2) Format string error (CVE-ID: CVE-2010-2950)
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
Format string vulnerability in stream.c in the phar extension in PHP 5.3.x through 5.3.3 allows context-dependent attackers to obtain sensitive information (memory contents) and possibly execute arbitrary code via a crafted phar:// URI that is not properly handled by the phar_stream_flush function, leading to errors in the php_stream_wrapper_log_error function. NOTE: this vulnerability exists because of an incomplete fix for CVE-2010-2094.
Remediation
Install update from vendor's website.
References
- http://sirdarckcat.blogspot.com/2009/10/couple-of-unicode-issues-on-php-and.html
- http://www.mandriva.com/en/security/advisories?name=MDVSA-2010:224
- http://bugs.php.net/bug.php?id=48230
- http://us2.php.net/manual/en/function.utf8-decode.php#83935
- http://www.openwall.com/lists/oss-security/2010/11/02/8
- http://www.openwall.com/lists/oss-security/2010/11/02/11
- http://www.acunetix.com/blog/web-security-articles/security-risks-associated-with-utf8_decode/
- http://bugs.php.net/bug.php?id=49687
- http://www.openwall.com/lists/oss-security/2010/11/02/4
- http://www.openwall.com/lists/oss-security/2010/11/02/6
- http://www.openwall.com/lists/oss-security/2010/11/03/1
- http://www.openwall.com/lists/oss-security/2010/11/02/1
- http://www.openwall.com/lists/oss-security/2010/11/02/2
- http://www.blackhat.com/presentations/bh-usa-09/VELANAVA/BHUSA09-VelaNava-FavoriteXSS-SLIDES.pdf
- http://svn.php.net/viewvc?view=revision&revision=304959
- http://www.redhat.com/support/errata/RHSA-2010-0919.html
- http://www.securityfocus.com/bid/44605
- http://www.securitytracker.com/id?1024797
- http://www.vupen.com/english/advisories/2010/3081
- http://secunia.com/advisories/42410
- http://www.vupen.com/english/advisories/2011/0020
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052845.html
- http://lists.fedoraproject.org/pipermail/package-announce/2011-January/052836.html
- http://lists.opensuse.org/opensuse-security-announce/2010-12/msg00000.html
- http://www.php.net/ChangeLog-5.php
- http://www.ubuntu.com/usn/USN-1042-1
- http://secunia.com/advisories/42812
- http://www.vupen.com/english/advisories/2011/0021
- http://www.vupen.com/english/advisories/2011/0077
- http://www.redhat.com/support/errata/RHSA-2011-0195.html
- http://support.apple.com/kb/HT4581
- http://lists.apple.com/archives/security-announce/2011/Mar/msg00006.html
- http://marc.info/?l=bugtraq&m=133469208622507&w=2
- http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
- http://marc.info/?l=bugtraq&m=130331363227777&w=2
- http://php-security.org/2010/05/14/mops-2010-024-php-phar_stream_flush-format-string-vulnerability/index.html
- http://security-tracker.debian.org/tracker/CVE-2010-2950
- http://svn.php.net/viewvc?view=revision&revision=302565
- http://www.mandriva.com/security/advisories?name=MDVSA-2010:254
- http://www.php.net/archive/2010.php#id2010-12-10-1
- http://www.php.net/releases/5_3_4.php
- https://bugzilla.redhat.com/show_bug.cgi?id=598537