10
CVSSv2

CVE-2004-1063

Published: 10/01/2005 Updated: 08/12/2020
CVSS v2 Base Score: 10 | Impact Score: 10 | Exploitability Score: 10
VMScore: 890
Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

php php

canonical ubuntu linux 4.10

Vendor Advisories

Stefano Di Paola discovered integer overflows in PHP’s pack() and unpack() functions A malicious PHP script could exploit these to break out of safe mode and execute arbitrary code with the privileges of the PHP interpreter (CAN-2004-1018) ...