Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-v2p7-54g6-4g8h

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

EPSS

Процентиль: 34%
0.00135
Низкий

Связанные уязвимости

ubuntu
больше 18 лет назад

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

nvd
больше 18 лет назад

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

debian
больше 18 лет назад

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-de ...

EPSS

Процентиль: 34%
0.00135
Низкий