First published: Wed Dec 17 2008(Updated: )
PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent attackers to write to arbitrary files by placing a "php_value error_log" entry in a .htaccess file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.1.5 | |
PHP | =5.1.2 | |
PHP | =5.1.1 | |
PHP | =5.0.0-beta1 | |
PHP | =5.1.6 | |
PHP | =5.2.2 | |
PHP | =5.0.5 | |
PHP | =5.0.1 | |
PHP | =5.1.4 | |
PHP | =5.2.5 | |
PHP | =5.0.4 | |
PHP | =5.0.0-rc2 | |
PHP | =5.2.3 | |
PHP | =5.0.3 | |
PHP | =5.1.0 | |
PHP | =5.0.0-rc3 | |
PHP | =5.2.0 | |
PHP | =5.2.4 | |
PHP | =5.0.0-beta3 | |
PHP | =5.1.3 | |
PHP | =5.0.0-rc1 | |
PHP | =5.0.2 | |
PHP | <=5.2.6 | |
PHP | =5.2.1 | |
PHP | =5.0.0-beta4 | |
PHP | =5.0.0 | |
PHP | =5.0.0-beta2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-5625 is considered to be a medium severity vulnerability due to its ability to allow arbitrary file writes.
To fix CVE-2008-5625, upgrade PHP to version 5.2.7 or later to ensure proper enforcement of safe_mode restrictions.
CVE-2008-5625 affects PHP versions 5.0.0 up to 5.2.6, including specific earlier versions like 5.1.0 to 5.1.6.
CVE-2008-5625 allows attackers to exploit safe_mode settings to write arbitrary files through malicious .htaccess entries.
Yes, as a temporary workaround, you can disable the use of .htaccess files or reconfigure your server settings to prevent context-dependent attacks.