Bug 250726 (CVE-2007-3799)

Summary: CVE-2007-3799 php cross-site cookie insertion
Product: [Other] Security Response Reporter: Mark J. Cox <mjc>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: low Docs Contact:
Priority: low    
Version: unspecifiedCC: jorton, kreilly
Target Milestone: ---Keywords: Security
Target Release: ---   
Hardware: All   
OS: Linux   
Whiteboard: source=internet,public=20070601,reported=20070601,impact=low
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2008-01-16 14:07:24 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---
Bug Depends On: 278351, 278361, 278381, 278391, 278401, 278411, 278421, 278431    
Bug Blocks:    

Description Mark J. Cox 2007-08-03 08:55:16 UTC

"The session_start function in ext/session in PHP 4.x up to 4.4.7 and 5.x up to
5.2.3 allows remote attackers to insert arbitrary attributes into the session
cookie via special characters in a cookie that is obtained from (1) PATH_INFO,
(2) the session_id function, and (3) the session_start function, which are not
encoded or filtered when the new session cookie is generated."

Better expressed as: "The session_start function allows a cross-site cookie
insertion attack if a user follows an untrusted carefully-crafted URL"

"Affected are PHP4 <= 4.4.7 and PHP5 <= 5.2.3"

Comment 7 Red Hat Product Security 2008-01-16 14:07:24 UTC
This issue was addressed in:

Red Hat Application Stack:

Red Hat Enterprise Linux:

  updated to fixed upstream version