Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2008-5624

Опубликовано: 04 дек. 2008
Источник: redhat
EPSS Низкий

Описание

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

Отчет

We do not consider these to be security issues. For more details see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php

Дополнительная информация

Статус:

Low
https://bugzilla.redhat.com/show_bug.cgi?id=476985php: missing initialization of BG(page_uid) and BG(page_gid)

EPSS

Процентиль: 77%
0.01088
Низкий

Связанные уязвимости

ubuntu
больше 16 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

nvd
больше 16 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

debian
больше 16 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_ ...

github
больше 3 лет назад

PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

EPSS

Процентиль: 77%
0.01088
Низкий