Описание
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
Релиз | Статус | Примечание |
---|---|---|
dapper | ignored | end of life |
devel | DNE | |
edgy | ignored | end of life, was needed |
feisty | DNE | |
gutsy | DNE | |
hardy | DNE | |
intrepid | DNE | |
jaunty | DNE | |
karmic | DNE | |
upstream | needs-triage |
Показывать по
Ссылки на источники
4.6 Medium
CVSS2
Связанные уязвимости
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_base ...
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
4.6 Medium
CVSS2