[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248392

 
 

909

 
 

195452

 
 

282

Paid content will be excluded from the download.


Download | Alert*
CVE
view JSON

CVE-2004-1063Date: (C)2005-01-10   (M)2023-12-22


PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

CVSS Score and Metrics +CVSS Score and Metrics -

CVSS V2 Severity:
CVSS Score : 10.0
Exploit Score: 10.0
Impact Score: 10.0
 
CVSS V2 Metrics:
Access Vector: NETWORK
Access Complexity: LOW
Authentication: NONE
Confidentiality: COMPLETE
Integrity: COMPLETE
Availability: COMPLETE
  
Reference:
BID-11964
OSVDB-12412
http://www.securityfocus.com/archive/1/384545
CLA-2005:915
GLSA-200412-14
HPSBMA01212
MDKSA-2004:151
MDKSA-2005:072
USN-99-1
http://www.hardened-php.net/advisories/012004.txt
http://www.php.net/release_4_3_10.php
php-safemodeexecdir-restriction-bypass(18511)

CPE    2
cpe:/o:canonical:ubuntu_linux:4.10
cpe:/a:php:php

© SecPod Technologies