First published: Mon Jan 09 2006(Updated: )
The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache2triad Apache2triad | ||
PHP PEAR | =0.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0144 has a high severity rating due to its potential for remote code execution.
To fix CVE-2006-0144, ensure that you do not use outdated versions of PHP PEAR and avoid configuring the proxy server feature.
CVE-2006-0144 specifically affects PHP PEAR version 0.2.2.
Users of PHP PEAR 0.2.2 and Apache2Triad who have the proxy server feature enabled are affected by CVE-2006-0144.
CVE-2006-0144 enables remote attackers to execute arbitrary PHP code through a malicious proxy server.