[Forgot Password]
Login  Register Subscribe

23631

 
 

115083

 
 

97147

 
 

909

 
 

78764

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-5658

Date: (C)2008-12-17   (M)2017-11-18 


Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.

CVSS Score: 7.5Access Vector: NETWORK
Exploit Score: 10.0Access Complexity: LOW
Impact Score: 6.4Authentication: NONE
 Confidentiality: PARTIAL
 Integrity: PARTIAL
 Availability: PARTIAL





Reference:
SECTRACK-1021303
http://archives.neohapsis.com/archives/bugtraq/2008-12/0039.html
http://www.securityfocus.com/archive/1/archive/1/501376/100/0/threaded
BID-32625
SECUNIA-35003
SECUNIA-35306
SECUNIA-35650
OSVDB-50480
DSA-1789
FEDORA-2009-3768
FEDORA-2009-3848
HPSBUX02465
MDVSA-2009:045
RHSA-2009:0350
SSRT090085
SSRT090192
SUSE-SR:2009:004
http://www.openwall.com/lists/oss-security/2008/12/04/3
http://wiki.rpath.com/Advisories:rPSA-2009-0035
http://www.php.net/ChangeLog-5.php#5.2.7
http://www.sektioneins.de/advisories/SE-2008-06.txt
php-ziparchive-directory-traversal(47079)

CPE    27
cpe:/a:php:php:5.0.0:rc3
cpe:/a:php:php:5.0.0:rc2
cpe:/a:php:php:5.0.0:rc1
cpe:/a:php:php:5.0.0
...
CWE    1
CWE-22
OVAL    10
oval:org.secpod.oval:def:600424
oval:org.secpod.oval:def:101758
oval:org.secpod.oval:def:102424
oval:org.secpod.oval:def:101916
...

© 2013 SecPod Technologies