First published: Wed Dec 17 2008(Updated: )
PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.1.5 | |
PHP | =5.1.2 | |
PHP | =5.1.1 | |
PHP | =5.0.0-beta1 | |
PHP | =5.1.6 | |
PHP | =5.2.7 | |
PHP | =5.2.2 | |
PHP | =5.0.5 | |
PHP | =5.0.1 | |
PHP | =5.1.4 | |
PHP | =5.2.5 | |
PHP | =5.0.4 | |
PHP | =5.2.6 | |
PHP | =5.0.0-rc2 | |
PHP | =5.2.3 | |
PHP | =5.0.3 | |
PHP | =5.1.0 | |
PHP | =5.0.0-rc3 | |
PHP | =5.2.0 | |
PHP | =5.2.4 | |
PHP | =5.0.0-beta3 | |
PHP | =5.1.3 | |
PHP | =5.0.0-rc1 | |
PHP | =5.0.2 | |
PHP | =5.2.1 | |
PHP | =5.0.0-beta4 | |
PHP | =5.0.0 | |
PHP | =5.0.0-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2008-5624 is considered medium due to its potential to bypass safe_mode restrictions.
To fix CVE-2008-5624, upgrade to PHP version 5.2.7 or later, where the vulnerability is addressed.
CVE-2008-5624 affects PHP versions 5.0.0 through 5.2.6, prior to version 5.2.7.
CVE-2008-5624 allows context-dependent attackers to bypass safe_mode restrictions, which can lead to privilege escalation.
You can detect vulnerability to CVE-2008-5624 by checking the PHP version in use and seeing if it is older than 5.2.7.