The PEAR_REST class in REST.php in PEAR in PHP through 5.6.0 allows local users to write to arbitrary files via a symlink attack on a (1) rest.cachefile or (2) rest.cacheid file in /tmp/pear/cache/, related to the retrieveCacheFirst and useLocalCache functions.
The MITRE CVE dictionary describes this issue as:
Find out more about CVE-2014-5459 from the MITRE CVE dictionary dictionary and NIST NVD.
This issue did not affect the versions of php-pear as shipped with Red Hat Enterprise Linux 5, 6 and 7 as well as Red Hat Software Collections as they do not use a world-writable directory for storing PEAR cache data.
NOTE: The following CVSS v2 metrics and score provided are preliminary and subject to review.
Base Score | 3.6 |
---|---|
Base Metrics | AV:L/AC:L/Au:N/C:N/I:P/A:P |
Access Vector | Local |
Access Complexity | Low |
Authentication | None |
Confidentiality Impact | None |
Integrity Impact | Partial |
Availability Impact | Partial |
Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).
Platform | Package | State |
---|---|---|
Red Hat Software Collections 1 for Red Hat Enterprise Linux | php55-php-pear | Not affected |
Red Hat Software Collections 1 for Red Hat Enterprise Linux | php54-php-pear | Not affected |
Red Hat Enterprise Linux 7 | php-pear | Not affected |
Red Hat Enterprise Linux 6 | php-pear | Not affected |
Red Hat Enterprise Linux 5 | php-pear | Not affected |