Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1129

Опубликовано: 26 мар. 2010
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 7.5

Описание

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

РелизСтатусПримечание
dapper

released

5.1.2-1ubuntu3.19
devel

not-affected

5.3.2-1ubuntu3
hardy

released

5.2.4-2ubuntu5.12
intrepid

ignored

end of life, was needed
jaunty

released

5.2.6.dfsg.1-3ubuntu4.6
karmic

released

5.2.10.dfsg.1-2ubuntu6.5
lucid

not-affected

5.3.2-1ubuntu3
upstream

released

5.2.13, 5.3.2

Показывать по

EPSS

Процентиль: 82%
0.01859
Низкий

7.5 High

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

nvd
больше 15 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

debian
больше 15 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly ha ...

github
около 3 лет назад

The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.

EPSS

Процентиль: 82%
0.01859
Низкий

7.5 High

CVSS2