PHP <= 5.2.9 SafeMod Bypass Vulnerability (win32)

2009.06.01
Credit: Abysssec
Risk: Medium
Local: Yes
Remote: No
CVE: N/A
CWE: N/A

Abysssec Inc Public Advisory Title : PHP <= 5.2.9 SafeMod Bypass Vulnerability Affected Version : Tested on 5.2.8, 5.2.6 but previous versions maybe be afftect Vendor Site : www.php.net Vulnerability Discoverd by : www.abysssec.com Description : Here is another safemod bypass vulnerability exist in php <= 5.2.9 on windows . the problem comes from OS behavior - implement and interfacing between php and operation systems directory structure . the problem is php won't tell difference between directory browsing in linux and windows this can lead attacker to ability execute his / her commands on targert machie even in SafeMod On (php.ini setting) . Vulnerability : in linux when you want open a directory for example php directory you need to go to /usr/bin/php and you can't use \usr\bin\php . but windows won't tell diffence between slash and back slash it means there is no didffrence between c:\php and c:/php , and this is not vulnerability but itself but because of this simple php implement "\" character can escape safemode using function like excec . PoC / Exploit : orginal : www.abysssec.com/safemod-windows.zip mirror : www.milw0rm.com/sploits/2009-safemod-windows.zip note : this vulnerabities is just for educational purpose and showing vulnerability exist so author will be not be responsible for any damage using this vulnerabilty. for more information visit Abysssec.com feel free to contact me at admin [at] abysssec.com

References:

www.php.net


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top