First published: Tue Mar 27 2007(Updated: )
The readfile function in PHP 4.4.4, 5.1.6, and 5.2.1 allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files by referring to local files with a certain URL syntax instead of a pathname syntax, as demonstrated by a filename preceded a "php://../../" sequence.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =4.4.4 | |
PHP | =5.1.6 | |
PHP | =5.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-1710 is classified as a moderate severity vulnerability due to its potential to expose sensitive files.
To fix CVE-2007-1710, upgrade your PHP version to 5.2.2 or later, or apply the relevant patches.
CVE-2007-1710 affects PHP versions 4.4.4, 5.1.6, and 5.2.1.
CVE-2007-1710 facilitates local file inclusion attacks by bypassing safe_mode restrictions.
Yes, CVE-2007-1710 can lead to unauthorized data exposure by allowing access to arbitrary files.