Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2010-1129

Опубликовано: 25 фев. 2010
Источник: redhat
EPSS Низкий

Описание

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

Отчет

We do not consider safe_mode / open_basedir restriction bypass issues to be security sensitive. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php

Ссылки на источники

Дополнительная информация

https://bugzilla.redhat.com/show_bug.cgi?id=577578php: safe_mode / open_basedir security fixes in 5.2.13/5.3.2

EPSS

Процентиль: 82%
0.01859
Низкий

Связанные уязвимости

ubuntu
больше 15 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

nvd
больше 15 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

debian
больше 15 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly ha ...

github
около 3 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

EPSS

Процентиль: 82%
0.01859
Низкий