vendor:
PHP
by:
shinnai
7.5
CVSS
HIGH
Bypassing safe_mode and disable_function in PHP 5.x COM functions
CWE
Product Name: PHP
Affected Version From: PHP 5.x
Affected Version To: PHP 5.x
Patch Exists: NO
Related CWE:
CPE:
Platforms Tested: Windows (Apache, PHP)
PHP 5.x COM functions safe_mode and disable_function bypass
This exploit allows an attacker to bypass the safe_mode and disable_function restrictions in PHP 5.x COM functions, potentially leading to remote code execution and compromise of the server. The vulnerability can be exploited both locally and remotely, with remote execution requiring a server that is MS-based and configured to work with PHP. The exploit takes advantage of the fact that the script is executed from a client that does not check Windows protections against execution of dangerous COM objects. The exploit works on Windows servers running Apache and PHP, and has been tested on Windows XP Pro SP2.
Mitigation:
To mitigate this vulnerability, it is recommended to update to a version of PHP that is not affected by this exploit. Additionally, enabling and properly configuring security measures such as safe_mode, disable_functions, and open_basedir can help mitigate the risk of exploitation.