Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-3558

Опубликовано: 30 сент. 2009
Источник: redhat
EPSS Низкий

Описание

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.

Отчет

We do not consider safe_mode / open_basedir restriction bypass issues being security sensitive. For more details see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=539529php: safe_mode / open_basedir security fixes in 5.3.1

EPSS

Процентиль: 88%
0.04194
Низкий

Связанные уязвимости

ubuntu
почти 16 лет назад

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.

nvd
почти 16 лет назад

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.

debian
почти 16 лет назад

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 an ...

github
больше 3 лет назад

The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.

EPSS

Процентиль: 88%
0.04194
Низкий