First published: Fri Mar 26 2010(Updated: )
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | =5.2.9 | |
PHP | =5.2.7 | |
PHP | =5.2.2 | |
PHP | =5.2.5 | |
PHP | =5.2.12 | |
PHP | =5.2.11 | |
PHP | =5.2.6 | |
PHP | =5.2.3 | |
PHP | =5.2.0 | |
PHP | =5.2.4 | |
PHP | =5.2.10 | |
PHP | =5.2.1 | |
PHP | =5.2.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1129 has a severity rating of medium, indicating it poses a moderate risk to system integrity.
To fix CVE-2010-1129, upgrade PHP to version 5.2.13 or later to ensure proper handling of directory pathnames.
CVE-2010-1129 affects PHP versions prior to 5.2.13, specifically 5.2.0 through 5.2.12.
CVE-2010-1129 is a path traversal vulnerability that allows unauthorized access due to improper pathname handling.
Yes, CVE-2010-1129 can potentially be exploited remotely by context-dependent attackers to bypass access restrictions.