Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2007-1710

Опубликовано: 27 мар. 2007
Источник: ubuntu
Приоритет: untriaged
EPSS Низкий
CVSS2: 4.3

Описание

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

РелизСтатусПримечание
dapper

not-affected

devel

DNE

edgy

not-affected

feisty

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

not-affected

devel

not-affected

edgy

not-affected

feisty

not-affected

upstream

needs-triage

Показывать по

Ссылки на источники

EPSS

Процентиль: 34%
0.00135
Низкий

4.3 Medium

CVSS2

Связанные уязвимости

nvd
больше 18 лет назад

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

debian
больше 18 лет назад

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-de ...

github
около 3 лет назад

The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.

EPSS

Процентиль: 34%
0.00135
Низкий

4.3 Medium

CVSS2