First published: Wed Dec 08 2004(Updated: )
PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | >=5.0.0<=5.0.2 | |
PHP | >=4.0.0<=4.3.9 | |
Ubuntu | =4.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-1063 is considered to have a moderate severity due to the potential for local users to execute commands outside designated directories.
To fix CVE-2004-1063, users should upgrade to a patched version of PHP that is beyond 4.3.9 or 5.0.2.
CVE-2004-1063 affects PHP versions 4.x up to 4.3.9 and 5.x up to 5.0.2 when running in safe mode.
Vulnerable systems include multithreaded Unix web servers running specific versions of PHP under safe mode.
Mitigations for CVE-2004-1063 include disabling safe mode or applying the latest security patches for affected PHP versions.