First published: Wed Oct 15 2003(Updated: )
The php_check_safe_mode_include_dir function in fopen_wrappers.c of PHP 4.3.x returns a success value (0) when the safe_mode_include_dir variable is not specified in configuration, which differs from the previous failure value and may allow remote attackers to exploit file include vulnerabilities in PHP applications.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =4.3.0 | |
PHP | =4.3.2 | |
PHP | =4.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0863 is considered a high severity vulnerability due to its potential to allow remote file inclusion attacks.
To fix CVE-2003-0863, ensure that the 'safe_mode_include_dir' configuration option is explicitly set in PHP 4.3.x.
CVE-2003-0863 affects PHP versions 4.3.0, 4.3.1, and 4.3.2.
CVE-2003-0863 is a file inclusion vulnerability that can be exploited due to improper handling of safe mode settings.
Yes, CVE-2003-0863 can be exploited remotely, allowing attackers to include malicious files through PHP scripts.