Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2007-1835

Опубликовано: 03 апр. 2007
Источник: debian
EPSS Низкий

Описание

PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php4removedpackage
php5removedpackage

Примечания

  • open_basedir bypasses not supported

EPSS

Процентиль: 34%
0.00134
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.

nvd
около 18 лет назад

PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.

github
около 3 лет назад

PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.

EPSS

Процентиль: 34%
0.00134
Низкий