Vulnerability CVE-2006-6383


Published: 2006-12-10   Modified: 2012-02-12

Description:
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

See advisories in our WLB2 database:
Topic
Author
Date
High
PHP 5.2.0 session.save_path safe_mode and open_basedir bypass
Maksymilian Arci...
08.12.2006

Type:

CWE-20

(Improper Input Validation)

CVSS2 => (AV:L/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.6/10
6.4/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
PHP -> PHP 

 References:
http://cvs.php.net/viewcvs.cgi/php-src/ext/session/session.c?r1=1.336.2.53.2.7&r2=1.336.2.53.2.8
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
http://securityreason.com/achievement_securityalert/43
http://securityreason.com/securityalert/2000
http://www.mandriva.com/security/advisories?name=MDKSA-2007:038
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html
http://www.securityfocus.com/archive/1/453938/30/9270/threaded
http://www.securityfocus.com/bid/21508

Copyright 2024, cxsecurity.com

 

Back to Top