First published: Wed Dec 08 2004(Updated: )
PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP PHP | >=4.0.0<=4.3.9 | |
PHP PHP | >=5.0.0<=5.0.2 | |
Canonical Ubuntu Linux | =4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.