CVE-2006-4483

The cURL extension files (1) ext/curl/interface.c and (2) ext/curl/streams.c in PHP before 5.1.5 permit the CURLOPT_FOLLOWLOCATION option when open_basedir or safe_mode is enabled, which allows attackers to perform unauthorized actions, possibly related to the realpath cache.
References
Link Resource
http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?r1=1.62.2.14.2.6&r2=1.62.2.14.2.7 Broken Link Patch
http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?view=log Broken Link Patch
http://cvs.php.net/viewvc.cgi/php-src/ext/curl/streams.c?r1=1.14.2.2.2.3&r2=1.14.2.2.2.4 Broken Link Patch
http://secunia.com/advisories/21546 Not Applicable Patch Vendor Advisory
http://secunia.com/advisories/22039 Not Applicable
http://secunia.com/advisories/30411 Not Applicable
http://securitytracker.com/id?1016984 Broken Link Third Party Advisory VDB Entry
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178 Broken Link
http://www.novell.com/linux/security/advisories/2006_52_php.html Broken Link
http://www.php.net/ChangeLog-5.php#5.1.5 Release Notes Vendor Advisory
http://www.php.net/release_5_1_5.php Patch Release Notes Vendor Advisory
http://www.securityfocus.com/archive/1/492671/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/19582 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/3318 Permissions Required
http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?r1=1.62.2.14.2.6&r2=1.62.2.14.2.7 Broken Link Patch
http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?view=log Broken Link Patch
http://cvs.php.net/viewvc.cgi/php-src/ext/curl/streams.c?r1=1.14.2.2.2.3&r2=1.14.2.2.2.4 Broken Link Patch
http://secunia.com/advisories/21546 Not Applicable Patch Vendor Advisory
http://secunia.com/advisories/22039 Not Applicable
http://secunia.com/advisories/30411 Not Applicable
http://securitytracker.com/id?1016984 Broken Link Third Party Advisory VDB Entry
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178 Broken Link
http://www.novell.com/linux/security/advisories/2006_52_php.html Broken Link
http://www.php.net/ChangeLog-5.php#5.1.5 Release Notes Vendor Advisory
http://www.php.net/release_5_1_5.php Patch Release Notes Vendor Advisory
http://www.securityfocus.com/archive/1/492671/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/19582 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2006/3318 Permissions Required
Configurations

Configuration 1 (hide)

cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:16

Type Values Removed Values Added
References () http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?r1=1.62.2.14.2.6&r2=1.62.2.14.2.7 - Broken Link, Patch () http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?r1=1.62.2.14.2.6&r2=1.62.2.14.2.7 - Broken Link, Patch
References () http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?view=log - Broken Link, Patch () http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?view=log - Broken Link, Patch
References () http://cvs.php.net/viewvc.cgi/php-src/ext/curl/streams.c?r1=1.14.2.2.2.3&r2=1.14.2.2.2.4 - Broken Link, Patch () http://cvs.php.net/viewvc.cgi/php-src/ext/curl/streams.c?r1=1.14.2.2.2.3&r2=1.14.2.2.2.4 - Broken Link, Patch
References () http://secunia.com/advisories/21546 - Not Applicable, Patch, Vendor Advisory () http://secunia.com/advisories/21546 - Not Applicable, Patch, Vendor Advisory
References () http://secunia.com/advisories/22039 - Not Applicable () http://secunia.com/advisories/22039 - Not Applicable
References () http://secunia.com/advisories/30411 - Not Applicable () http://secunia.com/advisories/30411 - Not Applicable
References () http://securitytracker.com/id?1016984 - Broken Link, Third Party Advisory, VDB Entry () http://securitytracker.com/id?1016984 - Broken Link, Third Party Advisory, VDB Entry
References () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178 - Broken Link () http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178 - Broken Link
References () http://www.novell.com/linux/security/advisories/2006_52_php.html - Broken Link () http://www.novell.com/linux/security/advisories/2006_52_php.html - Broken Link
References () http://www.php.net/ChangeLog-5.php#5.1.5 - Release Notes, Vendor Advisory () http://www.php.net/ChangeLog-5.php#5.1.5 - Release Notes, Vendor Advisory
References () http://www.php.net/release_5_1_5.php - Patch, Release Notes, Vendor Advisory () http://www.php.net/release_5_1_5.php - Patch, Release Notes, Vendor Advisory
References () http://www.securityfocus.com/archive/1/492671/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/492671/100/0/threaded - Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/19582 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/19582 - Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2006/3318 - Permissions Required () http://www.vupen.com/english/advisories/2006/3318 - Permissions Required

Information

Published : 2006-08-31 21:04

Updated : 2024-11-21 00:16


NVD link : CVE-2006-4483

Mitre link : CVE-2006-4483

CVE.ORG link : CVE-2006-4483


JSON object : View

Products Affected

php

  • php
CWE
CWE-862

Missing Authorization