Описание
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
Релиз | Статус | Примечание |
---|---|---|
dapper | not-affected | 5.1.2-1ubuntu3.18 |
devel | not-affected | 5.3.2-1ubuntu3 |
hardy | released | 5.2.4-2ubuntu5.12 |
intrepid | ignored | end of life, was needed |
jaunty | released | 5.2.6.dfsg.1-3ubuntu4.6 |
karmic | released | 5.2.10.dfsg.1-2ubuntu6.5 |
lucid | not-affected | 5.3.2-1ubuntu3 |
upstream | released | 5.2.13, 5.3.2 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
session.c in the session extension in PHP before 5.2.13, and 5.3.1, do ...
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
EPSS
5 Medium
CVSS2