CVE-2004-1020

Publication date 10 January 2005

Last updated 17 July 2025


Ubuntu priority

Description

The addslashes function in PHP 4.3.9 does not properly escape a NULL (/0) character, which may allow remote attackers to read arbitrary files in PHP applications that contain a directory traversal vulnerability in require or include statements, but are otherwise protected by the magic_quotes_gpc mechanism. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

Status

Package Ubuntu Release Status
php4 7.04 feisty Not in release
6.10 edgy
Fixed 4.4.2-1build1
6.06 LTS dapper
Fixed 4.4.2-1build1
php5 7.04 feisty
Fixed 5.2.1-0ubuntu1.4
6.10 edgy
Fixed 5.1.6-1ubuntu2.6
6.06 LTS dapper
Fixed 5.1.2-1ubuntu3.9