Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mjxv-j6j2-hpmv

Опубликовано: 02 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.

EPSS

Процентиль: 89%
0.04443
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.

redhat
почти 16 лет назад

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.

nvd
больше 15 лет назад

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.

debian
больше 15 лет назад

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 an ...

EPSS

Процентиль: 89%
0.04443
Низкий