|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Sec Bug #78558 Information Exposure Through an Error Message
Submitted: 2019-09-18 10:25 UTC Modified: 2019-09-18 12:46 UTC
Avg. Score:5.0 ± 0.0
Reproduced:1 of 1 (100.0%)
Same Version:0 (0.0%)
Same OS:0 (0.0%)
From: aboud dot deek at gmail dot com Assigned: cmb (profile)
Status: Closed Package: Website problem
PHP Version: 7.4.0RC1 OS: mac os
Private report: No CVE-ID: None
View Add Comment Developer Edit
Anyone can comment on a bug. Have a simpler test case? Does it work for you on a different platform? Let us know!
Just going to say 'Me too!'? Don't clutter the database with that please !
Your email address:
Solve the problem:
38 + 19 = ?
Subscribe to this entry?

 [2019-09-18 10:25 UTC] aboud dot deek at gmail dot com
When make parameter (bug_type) array , will output Error Sql

when add [] for most parameter in **** will give us Error SQL 

Poc: reflect&project=All&php_os=&phpver=&cve_id=&assign%5B%5D=&author_email=&bug_age=0&bug_updated=0&commented_by=

Expected result:
Parameter (bug_type=) is reflecte and It is possible that the hacker can analyze the query and bypass the protection

if hacker can bypass filter or protection will have SQL Injection and XSS


Add a Patch

Pull Requests

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [2019-09-18 11:06 UTC]
-Type: Bug +Type: Security -Private report: No +Private report: Yes
 [2019-09-18 11:28 UTC]
-Assigned To: +Assigned To: cmb
 [2019-09-18 11:28 UTC]
I have committed a fix:
It will take a while until this goes live.
 [2019-09-18 12:46 UTC]
-Status: Assigned +Status: Closed
 [2019-09-18 12:46 UTC]
Well, this has already been fixed with

Thanks for reporting!
PHP Copyright © 2001-2024 The PHP Group
All rights reserved.
Last updated: Tue Apr 16 12:01:29 2024 UTC