Vulnerability Description
The set_magic_quotes_runtime function in PHP 5.3.2 and 5.3.3, when the MySQLi extension is used, does not properly interact with use of the mysqli_fetch_assoc function, which might make it easier for context-dependent attackers to conduct SQL injection attacks via crafted input that had been properly handled in earlier PHP versions.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 5.3.2 |
Related Weaknesses (CWE)
References
- http://bugs.php.net/52221
- http://www.php.net/ChangeLog-5.php
- http://www.securityfocus.com/bid/46056
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64964
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
- http://bugs.php.net/52221
- http://www.php.net/ChangeLog-5.php
- http://www.securityfocus.com/bid/46056
- https://exchange.xforce.ibmcloud.com/vulnerabilities/64964
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3
FAQ
What is CVE-2010-4700?
CVE-2010-4700 is a vulnerability with a CVSS score of 6.8 (MEDIUM). The set_magic_quotes_runtime function in PHP 5.3.2 and 5.3.3, when the MySQLi extension is used, does not properly interact with use of the mysqli_fetch_assoc function, which might make it easier for ...
How severe is CVE-2010-4700?
CVE-2010-4700 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-4700?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.