cPanel, when compiling Apache 1.3.29 and PHP with the mod_phpsuexec option, does not set the --enable-discard-path option, which causes php to use the SCRIPT_FILENAME variable to find and execute a script instead of the PATH_TRANSLATED variable, which allows local users to execute arbitrary PHP code as other users via a URL that references the attacker's script after the user's script, which executes the attacker's script with the user's privileges, a different vulnerability than CVE-2004-0529.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://bugzilla.cpanel.net/show_bug.cgi?id=283 - | |
References | () http://bugzilla.cpanel.net/show_bug.cgi?id=664 - | |
References | () http://www.a-squad.com/audit/explain10.html - | |
References | () http://www.securiteam.com/tools/5TP0N15CUA.html - Vendor Advisory | |
References | () http://www.securityfocus.com/archive/1/364112 - | |
References | () http://www.securityfocus.com/bid/10407 - Exploit, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16239 - |
Information
Published : 2004-08-18 04:00
Updated : 2024-11-20 23:48
NVD link : CVE-2004-0490
Mitre link : CVE-2004-0490
CVE.ORG link : CVE-2004-0490
JSON object : View
Products Affected
cpanel
- cpanel
CWE