Описание
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
| Релиз | Статус | Примечание |
|---|---|---|
| dapper | not-affected | 5.1.2-1ubuntu3.18 |
| devel | not-affected | 5.3.2-1ubuntu3 |
| hardy | released | 5.2.4-2ubuntu5.12 |
| intrepid | ignored | end of life, was needed |
| jaunty | released | 5.2.6.dfsg.1-3ubuntu4.6 |
| karmic | released | 5.2.10.dfsg.1-2ubuntu6.5 |
| lucid | not-affected | 5.3.2-1ubuntu3 |
| upstream | released | 5.2.13, 5.3.2 |
Показывать по
EPSS
5 Medium
CVSS2
Связанные уязвимости
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
session.c in the session extension in PHP before 5.2.13, and 5.3.1, do ...
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
EPSS
5 Medium
CVSS2