Описание
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2010-1129
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html
- http://secunia.com/advisories/38708
- http://secunia.com/advisories/40551
- http://securitytracker.com/id?1023661
- http://support.apple.com/kb/HT4312
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/releases/5_2_13.php
- http://www.securityfocus.com/bid/38431
- http://www.vupen.com/english/advisories/2010/0479
- http://www.vupen.com/english/advisories/2010/1796
Связанные уязвимости
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
The safe_mode implementation in PHP before 5.2.13 does not properly ha ...