Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2006-6383

Опубликовано: 10 дек. 2006
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.6

Описание

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

edgy

ignored

end of life, was needed
feisty

DNE

gutsy

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 34%
0.00133
Низкий

4.6 Medium

CVSS2

Связанные уязвимости

nvd
больше 18 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

debian
больше 18 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_base ...

github
больше 3 лет назад

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

EPSS

Процентиль: 34%
0.00133
Низкий

4.6 Medium

CVSS2