CVE-2006-5178

Race condition in the symlink function in PHP 5.1.6 and earlier allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by the underlying system, as demonstrated by symlinking a symlink into a subdirectory, to point to a parent directory via .. (dot dot) sequences, and then unlinking the resulting symlink.
References
Link Resource
http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049850.html Exploit
http://secunia.com/advisories/22235 Exploit Vendor Advisory
http://secunia.com/advisories/22424
http://securityreason.com/securityalert/1692
http://securitytracker.com/id?1016977 Exploit
http://www.hardened-php.net/advisory_082006.132.html Exploit Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:185
http://www.neosecurityteam.net/index.php?action=advisories&id=26
http://www.securityfocus.com/archive/1/447649/100/0/threaded
http://www.securityfocus.com/archive/1/448020/100/0/threaded
http://www.securityfocus.com/archive/1/448953/100/0/threaded
http://www.securityfocus.com/bid/20326 Exploit
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
http://www.vupen.com/english/advisories/2006/3901
https://exchange.xforce.ibmcloud.com/vulnerabilities/29340
http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049850.html Exploit
http://secunia.com/advisories/22235 Exploit Vendor Advisory
http://secunia.com/advisories/22424
http://securityreason.com/securityalert/1692
http://securitytracker.com/id?1016977 Exploit
http://www.hardened-php.net/advisory_082006.132.html Exploit Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:185
http://www.neosecurityteam.net/index.php?action=advisories&id=26
http://www.securityfocus.com/archive/1/447649/100/0/threaded
http://www.securityfocus.com/archive/1/448020/100/0/threaded
http://www.securityfocus.com/archive/1/448953/100/0/threaded
http://www.securityfocus.com/bid/20326 Exploit
http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
http://www.vupen.com/english/advisories/2006/3901
https://exchange.xforce.ibmcloud.com/vulnerabilities/29340
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2:*:dev:*:*:*:*:*
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.8:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.9:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.10:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.3.11:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.4.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0:rc3:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*

History

21 Nov 2024, 00:18

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049850.html - Exploit () http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049850.html - Exploit
References () http://secunia.com/advisories/22235 - Exploit, Vendor Advisory () http://secunia.com/advisories/22235 - Exploit, Vendor Advisory
References () http://secunia.com/advisories/22424 - () http://secunia.com/advisories/22424 -
References () http://securityreason.com/securityalert/1692 - () http://securityreason.com/securityalert/1692 -
References () http://securitytracker.com/id?1016977 - Exploit () http://securitytracker.com/id?1016977 - Exploit
References () http://www.hardened-php.net/advisory_082006.132.html - Exploit, Vendor Advisory () http://www.hardened-php.net/advisory_082006.132.html - Exploit, Vendor Advisory
References () http://www.mandriva.com/security/advisories?name=MDKSA-2006:185 - () http://www.mandriva.com/security/advisories?name=MDKSA-2006:185 -
References () http://www.neosecurityteam.net/index.php?action=advisories&id=26 - () http://www.neosecurityteam.net/index.php?action=advisories&id=26 -
References () http://www.securityfocus.com/archive/1/447649/100/0/threaded - () http://www.securityfocus.com/archive/1/447649/100/0/threaded -
References () http://www.securityfocus.com/archive/1/448020/100/0/threaded - () http://www.securityfocus.com/archive/1/448020/100/0/threaded -
References () http://www.securityfocus.com/archive/1/448953/100/0/threaded - () http://www.securityfocus.com/archive/1/448953/100/0/threaded -
References () http://www.securityfocus.com/bid/20326 - Exploit () http://www.securityfocus.com/bid/20326 - Exploit
References () http://www.turbolinux.com/security/2006/TLSA-2006-38.txt - () http://www.turbolinux.com/security/2006/TLSA-2006-38.txt -
References () http://www.vupen.com/english/advisories/2006/3901 - () http://www.vupen.com/english/advisories/2006/3901 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/29340 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/29340 -

Information

Published : 2006-10-10 04:06

Updated : 2024-11-21 00:18


NVD link : CVE-2006-5178

Mitre link : CVE-2006-5178

CVE.ORG link : CVE-2006-5178


JSON object : View

Products Affected

php

  • php
CWE
CWE-362

Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')