The exec_dir PHP patch (php-exec-dir) 4.3.2 through 4.3.7 with safe mode disabled allows remote attackers to bypass restrictions and execute arbitrary commands via a backtick operator, which is not handled using the php_escape_shell_cmd function.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:53
Type | Values Removed | Values Added |
---|---|---|
References | () http://kyberdigi.cz/projects/execdir/english.html - Patch | |
References | () http://seclists.org/fulldisclosure/2004/Jul/0347.html - | |
References | () http://seclists.org/fulldisclosure/2004/Jul/0350.html - | |
References | () http://seclists.org/fulldisclosure/2004/Jul/0357.html - | |
References | () http://secunia.com/advisories/11928 - Vendor Advisory | |
References | () http://www.osvdb.org/7243 - | |
References | () http://www.securityfocus.com/bid/10598 - Exploit, Patch | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/16498 - |
Information
Published : 2004-12-31 05:00
Updated : 2024-11-20 23:53
NVD link : CVE-2004-2692
Mitre link : CVE-2004-2692
CVE.ORG link : CVE-2004-2692
JSON object : View
Products Affected
kyberdigi_labs
- php-exec-dir