CVSS2
Attack Vector
LOCAL
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:H/Au:N/C:C/I:C/A:C
AI Score
Confidence
Low
EPSS
Percentile
21.1%
Race condition in the symlink function in PHP 5.1.6 and earlier allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by the underlying system, as demonstrated by symlinking a symlink into a subdirectory, to point to a parent directory via … (dot dot) sequences, and then unlinking the resulting symlink.
Vendor | Product | Version | CPE |
---|---|---|---|
php | php | * | cpe:2.3:a:php:php:*:*:*:*:*:*:*:* |
php | php | 4.0 | cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:* |
php | php | 4.0.1 | cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:* |
php | php | 4.0.1 | cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:* |
php | php | 4.0.1 | cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:* |
php | php | 4.0.2 | cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:* |
php | php | 4.0.3 | cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:* |
php | php | 4.0.4 | cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:* |
php | php | 4.0.5 | cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:* |
php | php | 4.0.6 | cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:* |
lists.grok.org.uk/pipermail/full-disclosure/2006-October/049850.html
secunia.com/advisories/22235
secunia.com/advisories/22424
securityreason.com/securityalert/1692
securitytracker.com/id?1016977
www.hardened-php.net/advisory_082006.132.html
www.mandriva.com/security/advisories?name=MDKSA-2006:185
www.neosecurityteam.net/index.php?action=advisories&id=26
www.securityfocus.com/archive/1/447649/100/0/threaded
www.securityfocus.com/archive/1/448020/100/0/threaded
www.securityfocus.com/archive/1/448953/100/0/threaded
www.securityfocus.com/bid/20326
www.turbolinux.com/security/2006/TLSA-2006-38.txt
www.vupen.com/english/advisories/2006/3901
exchange.xforce.ibmcloud.com/vulnerabilities/29340