PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:22
Type | Values Removed | Values Added |
---|---|---|
References | () http://cvs.php.net/viewcvs.cgi/php-src/ext/session/session.c?r1=1.336.2.53.2.7&r2=1.336.2.53.2.8 - | |
References | () http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html - | |
References | () http://secunia.com/advisories/24022 - Vendor Advisory | |
References | () http://secunia.com/advisories/24514 - Vendor Advisory | |
References | () http://securityreason.com/achievement_securityalert/43 - Exploit | |
References | () http://securityreason.com/securityalert/2000 - | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2007:038 - | |
References | () http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html - | |
References | () http://www.securityfocus.com/archive/1/453938/30/9270/threaded - | |
References | () http://www.securityfocus.com/bid/21508 - Exploit |
Information
Published : 2006-12-10 20:28
Updated : 2024-11-21 00:22
NVD link : CVE-2006-6383
Mitre link : CVE-2006-6383
CVE.ORG link : CVE-2006-6383
JSON object : View
Products Affected
php
- php
CWE
CWE-20
Improper Input Validation