1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
|
Candidate: CVE-2008-7002
PublicDate: 2009-08-19
References:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-7002
Description:
PHP 5.2.5 does not enforce (a) open_basedir and (b) safe_mode_exec_dir
restrictions for certain functions, which might allow local users to bypass
intended access restrictions and call programs outside of the intended
directory via the (1) exec, (2) system, (3) shell_exec, (4) passthru, or
(5) popen functions, possibly involving pathnames such as "C:" drive
notation.
Ubuntu-Description:
Notes:
jdstrand> PoC at http://downloads.securityfocus.com/vulnerabilities/exploits/31064.php
mdeslaur> The "PoC" doesn't turn on safe_mode, so of course
mdeslaur> safe_mode_exec_dir doesn't work. Ignoring.
Bugs:
Priority: low
Discovered-by:
Assigned-to:
Patches_php5:
upstream_php5: needs-triage
dapper_php5: ignored
hardy_php5: ignored
intrepid_php5: ignored
jaunty_php5: ignored
devel_php5: ignored
|