Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-vfqf-7vvp-5w4j

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

EPSS

Процентиль: 48%
0.00247
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
почти 19 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

nvd
почти 19 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

debian
почти 19 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_base ...

EPSS

Процентиль: 48%
0.00247
Низкий

Дефекты

CWE-20