Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9x38-6qv2-vw32

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.

PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.

EPSS

Процентиль: 34%
0.00134
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.

nvd
около 18 лет назад

PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.

debian
около 18 лет назад

PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session ...

EPSS

Процентиль: 34%
0.00134
Низкий