7.5 High
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:P/I:P/A:P
0.018 Low
EPSS
Percentile
88.1%
PHP
Version: 5.4.12/5.3.22 and earlier
Application link:
<http://php.net/>[](<http://fluxbb.org/>)
Severity level: High
Impact: open_basedir bypass
Access Vector: Remote
CVSS v2:
Base Score: 7.5
Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE: CVE-2013-1635
Software description
PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.
The specialists of Positive Technologies have detected bypass of the configuration directive “open_basedir” in PHP.
The vulnerability was detected in the PHP’s built-in SoapClient class. PHP does not validate the configration directive “soap.wsdl_cache_dir” before writing SOAP wsdl cache files to the filesystem. Thus an attacker is able to write remote wsdl files to arbitrary locations.
Update your software up to the latest version.
07.02.2013 - Vendor gets vulnerability details
14.03.2013 - Vendor releases fixed version and details
19.03.2013 - Public disclosure
The vulnerability was discovered by Arseniy Reutov, Positive Research Center (Positive Technologies Company)
<http://en.securitylab.ru/lab/PT-2013-12>
Reports on the vulnerabilities previously discovered by Positive Research:
<http://ptsecurity.com/research/advisory/>
<http://en.securitylab.ru/lab/>