header-logo
Suggest Exploit
vendor:
PHP
by:
SecurityFocus
7.5
CVSS
HIGH
Restriction-Bypass Vulnerabilities
264
CWE
Product Name: PHP
Affected Version From: 4.4.2002
Affected Version To: 5.1.2002
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: N/A
2006

PHP ‘safe_mode’ and ‘open_basedir’ Restriction-Bypass Vulnerabilities

PHP is prone to multiple 'safe_mode' and 'open_basedir' restriction-bypass vulnerabilities. Successful exploits could allow an attacker to access sensitive information or to write files in unauthorized locations. These vulnerabilities would be an issue in shared-hosting configurations where multiple users can create and execute arbitrary PHP script code, when the 'safe_mode' and 'open_basedir' restrictions are expected to isolate the users from each other.

Mitigation:

Ensure that the 'safe_mode' and 'open_basedir' restrictions are properly configured and enforced.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/17439/info
 
PHP is prone to multiple 'safe_mode' and 'open_basedir' restriction-bypass vulnerabilities. Successful exploits could allow an attacker to access sensitive information or to write files in unauthorized locations.
 
These vulnerabilities would be an issue in shared-hosting configurations where multiple users can create and execute arbitrary PHP script code, when the 'safe_mode' and 'open_basedir' restrictions are expected to isolate the users from each other.
 
These issues are reported to affect PHP versions 4.4.2 and 5.1.2; other versions may also be vulnerable.

copy("compress.zlib:///etc/passwd", "/home/<username>/passwd.txt");