Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-px6g-f34r-cm5g

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.

The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.

EPSS

Процентиль: 82%
0.01823
Низкий

Связанные уязвимости

ubuntu
около 18 лет назад

The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.

nvd
около 18 лет назад

The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.

debian
около 18 лет назад

The fopen function in PHP 5.2.0 does not properly handle invalid URI h ...

EPSS

Процентиль: 82%
0.01823
Низкий