header-logo
Suggest Exploit
vendor:
cURL
by:
Unknown
7.5
CVSS
HIGH
Bypassing open_basedir restrictions
22
CWE
Product Name: cURL
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:haxx:curl
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

cURL ‘open_basedir’ Bypass Vulnerability

The cURL module in PHP fails to properly enforce the 'open_basedir' restriction, allowing malicious users to bypass it and access arbitrary files on the server. This can lead to further attacks and unauthorized access to sensitive information.

Mitigation:

Apply the necessary patches or updates provided by the vendor. Additionally, review and strengthen the server's access control measures and permissions to prevent unauthorized access to sensitive files.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/11557/info

It is reported that cURL allows malicious users to bypass 'open_basedir' restrictions in PHP scripts. This issue is due to a failure of the cURL module to properly enforce PHPs 'open_basedir' restriction.

Users with the ability to create or modify PHP scripts on a server computer hosting the vulnerable software can reportedly exploit this vulnerability to bypass the 'open_basedir' restriction, and access arbitrary files with the privileges of the web server. This may aid them in further attacks.

This vulnerability possibly results in a false sense of security, as administrators expect that the restrictions in place prevent malicious users from gaining access to sensitive information.

<?php
$ch = curl_init("file:///etc/parla");
$file=curl_exec($ch);
echo $file
?>