CVE-2007-1396

N/A Unknown
Published: March 10, 2007 Modified: April 23, 2026
View on NVD

Description

The import_request_variables function in PHP 4.0.7 through 4.4.6, and 5.x before 5.2.2, when called without a prefix, does not prevent the (1) GET, (2) POST, (3) COOKIE, (4) FILES, (5) SERVER, (6) SESSION, and other superglobals from being overwritten, which allows remote attackers to spoof source IP address and Referer data, and have other unspecified impact. NOTE: it could be argued that this is a design limitation of PHP and that only the misuse of this feature, i.e. implementation bugs in applications, should be included in CVE. However, it has been fixed by the vendor.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/26048
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/2406
Source: af854a3a-2127-422b-91ae-364da2661108
http://us2.php.net/releases/4_4_7.php
Source: af854a3a-2127-422b-91ae-364da2661108
http://us2.php.net/releases/5_2_2.php
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/462263/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/462457/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/462658/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/462800/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/22886
Source: af854a3a-2127-422b-91ae-364da2661108

20 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
2.0%
84th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

php