Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2006-6383

Опубликовано: 10 дек. 2006
Источник: nvd
CVSS2: 4.6
EPSS Низкий

Описание

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*

EPSS

Процентиль: 51%
0.0028
Низкий

4.6 Medium

CVSS2

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 18 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

debian
больше 18 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_base ...

github
около 3 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

EPSS

Процентиль: 51%
0.0028
Низкий

4.6 Medium

CVSS2

Дефекты

CWE-20