Описание
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
Релиз | Статус | Примечание |
---|---|---|
dapper | released | 5.1.2-1ubuntu3.19 |
devel | not-affected | 5.3.2-1ubuntu3 |
hardy | released | 5.2.4-2ubuntu5.12 |
intrepid | ignored | end of life, was needed |
jaunty | released | 5.2.6.dfsg.1-3ubuntu4.6 |
karmic | released | 5.2.10.dfsg.1-2ubuntu6.5 |
lucid | not-affected | 5.3.2-1ubuntu3 |
upstream | released | 5.2.13, 5.3.2 |
Показывать по
EPSS
7.5 High
CVSS2
Связанные уязвимости
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
The safe_mode implementation in PHP before 5.2.13 does not properly ha ...
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
EPSS
7.5 High
CVSS2