Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-0448

Опубликовано: 24 мая 2007
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 10

Описание

The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 84%
0.02211
Низкий

10 Critical

CVSS2

Связанные уязвимости

nvd
больше 18 лет назад

The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.

debian
больше 18 лет назад

The fopen function in PHP 5.2.0 does not properly handle invalid URI h ...

github
больше 3 лет назад

The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.

EPSS

Процентиль: 84%
0.02211
Низкий

10 Critical

CVSS2