PHP 5.2.3 safe_mode 存在权限绕过漏洞

admin 2023-12-12 22:13:29 Ali_nvd 来源:ZONE.CI 全球网 0 阅读模式
PHP 5.2.3 safe_mode 存在权限绕过漏洞

CVE编号

CVE-2007-3378

利用情况

暂无

补丁情况

N/A

披露时间

2007-06-30
漏洞描述
The (1) session_save_path, (2) ini_set, and (3) error_log functions in PHP 4.4.7 and earlier, and PHP 5 5.2.3 and earlier, when invoked from a .htaccess file, allow remote attackers to bypass safe_mode and open_basedir restrictions and possibly execute arbitrary commands, as demonstrated using (a) php_value, (b) php_flag, and (c) directives in .htaccess.
解决建议
建议您更新当前系统或软件至最新版,完成漏洞的修复。
参考链接
http://docs.info.apple.com/article.html?artnum=307562
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://seclists.org/fulldisclosure/2020/Sep/34
http://secunia.com/advisories/26642
http://secunia.com/advisories/26822
http://secunia.com/advisories/26838
http://secunia.com/advisories/27102
http://secunia.com/advisories/27377
http://secunia.com/advisories/27648
http://secunia.com/advisories/28318
http://secunia.com/advisories/28750
http://secunia.com/advisories/28936
http://secunia.com/advisories/29420
http://secunia.com/advisories/30040
http://securityreason.com/achievement_exploitalert/9
http://securityreason.com/achievement_securityalert/45
http://securityreason.com/securityalert/2831
http://securityreason.com/securityalert/3389
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackw...
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
http://www.openwall.com/lists/oss-security/2020/09/17/3
http://www.osvdb.org/38682
http://www.php.net/ChangeLog-4.php
http://www.php.net/ChangeLog-5.php
http://www.php.net/ChangeLog-5.php
http://www.php.net/releases/4_4_8.php
http://www.php.net/releases/5_2_4.php
http://www.php.net/releases/5_2_5.php
http://www.securityfocus.com/archive/1/472343/100/0/threaded
http://www.securityfocus.com/archive/1/491693/100/0/threaded
http://www.securityfocus.com/bid/24661
http://www.securityfocus.com/bid/25498
http://www.trustix.org/errata/2007/0026/
http://www.vupen.com/english/advisories/2007/3023
http://www.vupen.com/english/advisories/2008/0059
http://www.vupen.com/english/advisories/2008/0398
http://www.vupen.com/english/advisories/2008/0924/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/35102
https://exchange.xforce.ibmcloud.com/vulnerabilities/39403
https://issues.rpath.com/browse/RPL-1693
https://issues.rpath.com/browse/RPL-1702
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ova...
受影响软件情况
# 类型 厂商 产品 版本 影响面
1
运行在以下环境
应用 php php * From (including) 4.0.0 Up to (including) 4.4.7
运行在以下环境
应用 php php * From (including) 5.0.0 Up to (including) 5.2.3
CVSS3评分 6.8
  • 攻击路径 网络
  • 攻击复杂度 N/A
  • 权限要求 无
  • 影响范围 N/A
  • 用户交互 无
  • 可用性 部分地
  • 保密性 部分地
  • 完整性 部分地
AV:N/AC:M/Au:N/C:P/I:P/A:P
CWE-ID 漏洞类型
CWE-264 权限、特权和访问控制
- avd.aliyun.com
weinxin
版权声明
本站原创文章转载请注明文章出处及链接,谢谢合作!
N/A Ali_nvd

N/A

N/ACVE编号 CVE-2024-9120利用情况 暂无补丁情况 N/A披露时间 2024-09-23漏洞描述Use after free in Dawn
评论:0   参与:  0