First published: Sun Dec 10 2006(Updated: )
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.0 | |
PHP | =4.4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6383 is considered a critical vulnerability as it allows local users to bypass security restrictions.
To fix CVE-2006-6383, upgrade to a version of PHP that is newer than 5.2.0 and 4.4.0.
CVE-2006-6383 affects users running PHP versions 5.2.0 and 4.4.0.
CVE-2006-6383 allows bypassing of safe_mode and open_basedir restrictions.
The impact of CVE-2006-6383 is that it compromises the integrity of session handling in PHP, potentially leading to unauthorized access.