Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2010-1129

Опубликовано: 26 мар. 2010
Источник: debian
EPSS Низкий

Описание

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php5fixed5.3.2-1package

Примечания

  • safe_mode not supported

EPSS

Процентиль: 82%
0.01859
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

redhat
больше 15 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

nvd
больше 15 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

github
около 3 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

EPSS

Процентиль: 82%
0.01859
Низкий