[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78730

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2006-5178

Date: (C)2006-10-10   (M)2017-07-21
 
CVSS Score: 6.2Access Vector: LOCAL
Exploitability Subscore: 1.9Access Complexity: HIGH
Impact Subscore: 10.0Authentication: NONE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Race condition in the symlink function in PHP 5.1.6 and earlier allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by the underlying system, as demonstrated by symlinking a symlink into a subdirectory, to point to a parent directory via .. (dot dot) sequences, and then unlinking the resulting symlink.

Reference:
SECTRACK-1016977
SREASON-1692
http://www.securityfocus.com/archive/1/archive/1/447649/100/0/threaded
http://www.securityfocus.com/archive/1/archive/1/448020/100/0/threaded
BID-20326
SECUNIA-22235
SECUNIA-22424
ADV-2006-3901
MDKSA-2006:185
OpenPKG-SA-2006.023
TLSA-2006-38
http://www.hardened-php.net/advisory_082006.132.html
http://www.neosecurityteam.net/index.php?action=advisories&id=26
php-openbasedir-security-bypass(29340)

CPE    44
cpe:/a:php:php:5.1
cpe:/a:php:php:5.1.4
cpe:/a:php:php:5.1.5
cpe:/a:php:php:5.1.6
...
CWE    1
CWE-362

© 2013 SecPod Technologies