ioncube_loader_win_5.2.dll in the ionCube Loader 6.5 extension for PHP 5.2.4 does not follow safe_mode and disable_functions restrictions, which allows context-dependent attackers to bypass intended limitations, as demonstrated by reading arbitrary files via the ioncube_read_file function.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/41708 - | |
References | () http://secunia.com/advisories/27178 - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/26024 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/37227 - | |
References | () https://www.exploit-db.com/exploits/4517 - |
Information
Published : 2007-10-14 18:17
Updated : 2024-11-21 00:37
NVD link : CVE-2007-5447
Mitre link : CVE-2007-5447
CVE.ORG link : CVE-2007-5447
JSON object : View
Products Affected
php
- php
ioncube
- php_encoder
CWE
CWE-264
Permissions, Privileges, and Access Controls