Описание
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
| Релиз | Статус | Примечание | 
|---|---|---|
| dapper | ignored  | end of life | 
| devel | DNE  | |
| edgy | ignored  | end of life, was needed | 
| feisty | DNE  | |
| gutsy | DNE  | |
| hardy | DNE  | |
| intrepid | DNE  | |
| jaunty | DNE  | |
| karmic | DNE  | |
| upstream | needs-triage  | 
Показывать по
Ссылки на источники
EPSS
4.6 Medium
CVSS2
Связанные уязвимости
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_base ...
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
EPSS
4.6 Medium
CVSS2