CVE-2007-3997

The (1) MySQL and (2) MySQLi extensions in PHP 4 before 4.4.8, and PHP 5 before 5.2.4, allow remote attackers to bypass safe_mode and open_basedir restrictions via MySQL LOCAL INFILE operations, as demonstrated by a query with LOAD DATA LOCAL INFILE.
References
Link Resource
http://secunia.com/advisories/26642 Third Party Advisory
http://secunia.com/advisories/26822 Third Party Advisory
http://secunia.com/advisories/26838 Third Party Advisory
http://secunia.com/advisories/27102 Third Party Advisory
http://secunia.com/advisories/27377 Third Party Advisory
http://secunia.com/advisories/28318 Third Party Advisory
http://securityreason.com/securityalert/3102 Exploit Third Party Advisory
http://secweb.se/en/advisories/php-mysql-safe-mode-bypass-vulnerability/ Exploit Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml Third Party Advisory
http://www.php.net/ChangeLog-4.php Vendor Advisory
http://www.php.net/ChangeLog-5.php#5.2.4 Vendor Advisory
http://www.php.net/releases/4_4_8.php Vendor Advisory
http://www.php.net/releases/5_2_4.php Vendor Advisory
http://www.trustix.org/errata/2007/0026/ Broken Link
http://www.vupen.com/english/advisories/2007/3023 Permissions Required Third Party Advisory
http://www.vupen.com/english/advisories/2008/0059 Permissions Required Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/36384 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/39402 Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-1693 Broken Link
https://issues.rpath.com/browse/RPL-1702 Broken Link
https://www.exploit-db.com/exploits/4392 Third Party Advisory VDB Entry
http://secunia.com/advisories/26642 Third Party Advisory
http://secunia.com/advisories/26822 Third Party Advisory
http://secunia.com/advisories/26838 Third Party Advisory
http://secunia.com/advisories/27102 Third Party Advisory
http://secunia.com/advisories/27377 Third Party Advisory
http://secunia.com/advisories/28318 Third Party Advisory
http://securityreason.com/securityalert/3102 Exploit Third Party Advisory
http://secweb.se/en/advisories/php-mysql-safe-mode-bypass-vulnerability/ Exploit Third Party Advisory
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml Third Party Advisory
http://www.php.net/ChangeLog-4.php Vendor Advisory
http://www.php.net/ChangeLog-5.php#5.2.4 Vendor Advisory
http://www.php.net/releases/4_4_8.php Vendor Advisory
http://www.php.net/releases/5_2_4.php Vendor Advisory
http://www.trustix.org/errata/2007/0026/ Broken Link
http://www.vupen.com/english/advisories/2007/3023 Permissions Required Third Party Advisory
http://www.vupen.com/english/advisories/2008/0059 Permissions Required Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/36384 Third Party Advisory VDB Entry
https://exchange.xforce.ibmcloud.com/vulnerabilities/39402 Third Party Advisory VDB Entry
https://issues.rpath.com/browse/RPL-1693 Broken Link
https://issues.rpath.com/browse/RPL-1702 Broken Link
https://www.exploit-db.com/exploits/4392 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:34

Type Values Removed Values Added
References () http://secunia.com/advisories/26642 - Third Party Advisory () http://secunia.com/advisories/26642 - Third Party Advisory
References () http://secunia.com/advisories/26822 - Third Party Advisory () http://secunia.com/advisories/26822 - Third Party Advisory
References () http://secunia.com/advisories/26838 - Third Party Advisory () http://secunia.com/advisories/26838 - Third Party Advisory
References () http://secunia.com/advisories/27102 - Third Party Advisory () http://secunia.com/advisories/27102 - Third Party Advisory
References () http://secunia.com/advisories/27377 - Third Party Advisory () http://secunia.com/advisories/27377 - Third Party Advisory
References () http://secunia.com/advisories/28318 - Third Party Advisory () http://secunia.com/advisories/28318 - Third Party Advisory
References () http://securityreason.com/securityalert/3102 - Exploit, Third Party Advisory () http://securityreason.com/securityalert/3102 - Exploit, Third Party Advisory
References () http://secweb.se/en/advisories/php-mysql-safe-mode-bypass-vulnerability/ - Exploit, Third Party Advisory () http://secweb.se/en/advisories/php-mysql-safe-mode-bypass-vulnerability/ - Exploit, Third Party Advisory
References () http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml - Third Party Advisory () http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml - Third Party Advisory
References () http://www.php.net/ChangeLog-4.php - Vendor Advisory () http://www.php.net/ChangeLog-4.php - Vendor Advisory
References () http://www.php.net/ChangeLog-5.php#5.2.4 - Vendor Advisory () http://www.php.net/ChangeLog-5.php#5.2.4 - Vendor Advisory
References () http://www.php.net/releases/4_4_8.php - Vendor Advisory () http://www.php.net/releases/4_4_8.php - Vendor Advisory
References () http://www.php.net/releases/5_2_4.php - Vendor Advisory () http://www.php.net/releases/5_2_4.php - Vendor Advisory
References () http://www.trustix.org/errata/2007/0026/ - Broken Link () http://www.trustix.org/errata/2007/0026/ - Broken Link
References () http://www.vupen.com/english/advisories/2007/3023 - Permissions Required, Third Party Advisory () http://www.vupen.com/english/advisories/2007/3023 - Permissions Required, Third Party Advisory
References () http://www.vupen.com/english/advisories/2008/0059 - Permissions Required, Third Party Advisory () http://www.vupen.com/english/advisories/2008/0059 - Permissions Required, Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/36384 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/36384 - Third Party Advisory, VDB Entry
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/39402 - Third Party Advisory, VDB Entry () https://exchange.xforce.ibmcloud.com/vulnerabilities/39402 - Third Party Advisory, VDB Entry
References () https://issues.rpath.com/browse/RPL-1693 - Broken Link () https://issues.rpath.com/browse/RPL-1693 - Broken Link
References () https://issues.rpath.com/browse/RPL-1702 - Broken Link () https://issues.rpath.com/browse/RPL-1702 - Broken Link
References () https://www.exploit-db.com/exploits/4392 - Third Party Advisory, VDB Entry () https://www.exploit-db.com/exploits/4392 - Third Party Advisory, VDB Entry

Information

Published : 2007-09-04 18:17

Updated : 2024-11-21 00:34


NVD link : CVE-2007-3997

Mitre link : CVE-2007-3997

CVE.ORG link : CVE-2007-3997


JSON object : View

Products Affected

php

  • php
CWE
CWE-264

Permissions, Privileges, and Access Controls