First published: Tue Oct 23 2007(Updated: )
The Component Object Model (COM) functions in PHP 5.x on Windows do not follow safe_mode and disable_functions restrictions, which allows context-dependent attackers to bypass intended limitations, as demonstrated by executing objects with the kill bit set in the corresponding ActiveX control Compatibility Flags, executing programs via a function in compatUI.dll, invoking wscript.shell via wscript.exe, invoking Scripting.FileSystemObject via wshom.ocx, and adding users via a function in shgina.dll, related to the com_load_typelib function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=5.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5653 has been classified as a high-severity vulnerability due to its ability to allow attackers to bypass security restrictions.
To mitigate CVE-2007-5653, upgrade PHP to a version later than 5.2.4 where this vulnerability has been addressed.
CVE-2007-5653 affects PHP 5.x on Windows systems, specifically versions up to and including 5.2.4.
CVE-2007-5653 allows attackers to execute objects that have the kill bit set, potentially leading to unauthorized actions on the system.
CVE-2007-5653 is considered a local vulnerability because it requires context-dependent access to exploit the COM functions.