Vulnerability CVE-2008-5624


Published: 2008-12-17   Modified: 2012-02-12

Description:
PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.

See advisories in our WLB2 database:
Topic
Author
Date
High
PHP 5.2.6 SAPI php_getuid() overload
Maksymilian Arci...
05.12.2008

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.5/10
6.4/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
Partial
Partial
Affected software
PHP -> PHP 

 References:
http://marc.info/?l=bugtraq&m=124654546101607&w=2
http://marc.info/?l=bugtraq&m=125631037611762&w=2
http://securityreason.com/achievement_securityalert/59
http://wiki.rpath.com/Advisories:rPSA-2009-0035
http://www.debian.org/security/2009/dsa-1789
http://www.mandriva.com/security/advisories?name=MDVSA-2009:045
http://www.php.net/ChangeLog-5.php#5.2.7
http://www.securityfocus.com/archive/1/498985/100/0/threaded
http://www.securityfocus.com/archive/1/501376/100/0/threaded
http://www.securityfocus.com/bid/32688
https://exchange.xforce.ibmcloud.com/vulnerabilities/47318

Copyright 2020, cxsecurity.com

 

Back to Top