PHP : HTML code injection prevention - suspicious GLOBALS variable


Description   On some servers using php scripts with a specific configuration, the use of GLOBALS[] array with a vulnerable parameter might allow a malicious user to inject HTML code.
     
Default
configuration
 
Profiles High Medium Low Internet
Action Block Block Block Block
Alarm Level Major Minor Minor Major
     
References  
     
Available since   ASQ v3.2.0
     
Protects   Dolphin "eval()" PHP Code Execution Vulnerability
GNUBoard "g4_path" File Inclusion Vulnerability
NetCat "search_query" PHP Code Execution Vulnerability
TYPO3 Code Execution and Multiple Cross Site Scripting Vulnerabilities
TYPO3 Code Execution and Cross Site Scripting Vulnerabilities
PHPope Multiple Parameter Remote File Inclusion Vulnerabilities
100 last CVE   CVE-2009-4472
CVE-2009-0290


 
 
 
 
 Risk level 
Moderate