Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2009-4018

Опубликовано: 23 июл. 2009
Источник: redhat
CVSS2: 3.3
EPSS Средний

Описание

The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable.

Отчет

We do not consider safe_mode / open_basedir restriction bypass issues being security sensitive. For more details see https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and https://www.php.net/security-note.php

Ссылки на источники

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=541239php: proc_open() safe mode restriction bypass

EPSS

Процентиль: 95%
0.1776
Средний

3.3 Low

CVSS2

Связанные уязвимости

ubuntu
больше 15 лет назад

The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable.

nvd
больше 15 лет назад

The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable.

debian
больше 15 лет назад

The proc_open function in ext/standard/proc_open.c in PHP before 5.2.1 ...

github
около 3 лет назад

The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable.

EPSS

Процентиль: 95%
0.1776
Средний

3.3 Low

CVSS2