CVE-2007-1522

N/A Unknown
Published: March 20, 2007 Modified: April 23, 2026
View on NVD

Description

Double free vulnerability in the session extension in PHP 5.2.0 and 5.2.1 allows context-dependent attackers to execute arbitrary code via illegal characters in a session identifier, which is rejected by an internal session storage module, which calls the session identifier generator with an improper environment, leading to code execution when the generator is interrupted, as demonstrated by triggering a memory limit violation or certain PHP errors.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.php-security.org/MOPB/MOPB-23-2007.html
Source: cve@mitre.org
Exploit Vendor Advisory
http://secunia.com/advisories/24505
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/25056
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.novell.com/linux/security/advisories/2007_32_php.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.php-security.org/MOPB/MOPB-23-2007.html
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Vendor Advisory
http://www.securityfocus.com/bid/22971
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/0960
Source: af854a3a-2127-422b-91ae-364da2661108

12 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
8.0%
92th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

php