First published: Mon Jun 04 2007(Updated: )
PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this issue might also involve the realpath function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | >=5.0.0<5.2.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3007 is considered a medium severity vulnerability due to its potential to expose sensitive file existence information.
To fix CVE-2007-3007, upgrade PHP to version 5.2.3 or later to ensure proper enforcement of open_basedir and safe_mode restrictions.
CVE-2007-3007 affects PHP versions prior to 5.2.3, specifically those in the 5.0.0 to 5.2.2 range.
CVE-2007-3007 may allow attackers to determine the existence of arbitrary files on the server, potentially leading to further exploitation.
While CVE-2007-3007 is outdated, it may still be a concern for systems running unsupported versions of PHP.