Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2010-1130

Опубликовано: 26 мар. 2010
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5

Описание

session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).

РелизСтатусПримечание
dapper

not-affected

5.1.2-1ubuntu3.18
devel

not-affected

5.3.2-1ubuntu3
hardy

released

5.2.4-2ubuntu5.12
intrepid

ignored

end of life, was needed
jaunty

released

5.2.6.dfsg.1-3ubuntu4.6
karmic

released

5.2.10.dfsg.1-2ubuntu6.5
lucid

not-affected

5.3.2-1ubuntu3
upstream

released

5.2.13, 5.3.2

Показывать по

EPSS

Процентиль: 92%
0.08609
Низкий

5 Medium

CVSS2

Связанные уязвимости

redhat
больше 15 лет назад

session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).

nvd
больше 15 лет назад

session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).

debian
больше 15 лет назад

session.c in the session extension in PHP before 5.2.13, and 5.3.1, do ...

github
больше 3 лет назад

session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).

EPSS

Процентиль: 92%
0.08609
Низкий

5 Medium

CVSS2