First published: Fri Jan 25 2008(Updated: )
curl/interface.c in the cURL library (aka libcurl) in PHP 5.2.4 and 5.2.5 allows context-dependent attackers to bypass safe_mode and open_basedir restrictions and read arbitrary files via a file:// request containing a \x00 sequence, a different vulnerability than CVE-2006-2563.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.5 | |
PHP | =5.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4850 is classified as a moderate severity vulnerability due to the potential to bypass security restrictions.
To fix CVE-2007-4850, upgrade your PHP version to at least 5.2.6 or later.
The impact of CVE-2007-4850 allows attackers to bypass safe_mode and open_basedir restrictions, enabling them to read arbitrary files.
CVE-2007-4850 affects PHP versions 5.2.4 and 5.2.5.
Yes, CVE-2007-4850 can be exploited by context-dependent attackers remotely through specific file requests.