2.1
CVSSv2

CVE-2006-1608

Published: 10/04/2006 Updated: 30/10/2018
CVSS v2 Base Score: 2.1 | Impact Score: 2.9 | Exploitability Score: 3.9
VMScore: 215
Vector: AV:L/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

The copy function in file.c in PHP 4.4.2 and 5.1.2 allows local users to bypass safe mode and read arbitrary files via a source argument containing a compress.zlib:// URI.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0.0

php php 4.0.1

php php 4.0.4

php php 4.0.5

php php 4.0

php php 4.2.0

php php 4.2.1

php php 4.3.11

php php 4.3.2

php php 4.4.0

php php 4.4.1

php php 5.0.0

php php 5.0

php php 4.0.2

php php 4.0.3

php php 4.0.7

php php 4.1.0

php php 4.2

php php 4.3.0

php php 4.3.5

php php 4.3.6

php php 4.3.7

php php 5.0.2

php php 5.0.3

php php 5.1.1

php php 5.1.2

php php 4.1.1

php php 4.1.2

php php 4.3.1

php php 4.3.10

php php 4.3.8

php php 4.3.9

php php 5.0.4

php php 5.0.5

php php 4.0.6

php php 4.2.2

php php 4.2.3

php php 4.3.3

php php 4.3.4

php php 4.4.2

php php 5.0.1

php php 5.1.0

Vendor Advisories

Debian Bug report logs - #361856 [CVE-2006-1608] copy() Safe Mode Bypass Package: php4; Maintainer for php4 is (unknown); Reported by: Oliver Paulus <oliver@code-projectorg> Date: Mon, 10 Apr 2006 19:33:14 UTC Severity: important Tags: patch, security Found in versions php4/4:4310-16, 4:442-11 Done: sean finney &lt ...
The phpinfo() PHP function did not properly sanitize long strings A remote attacker could use this to perform cross-site scripting attacks against sites that have publicly-available PHP scripts that call phpinfo() Please note that it is not recommended to publicly expose phpinfo() (CVE-2006-0996) ...

Exploits

source: wwwsecurityfocuscom/bid/17439/info PHP is prone to multiple 'safe_mode' and 'open_basedir' restriction-bypass vulnerabilities Successful exploits could allow an attacker to access sensitive information or to write files in unauthorized locations These vulnerabilities would be an issue in shared-hosting configurations where mu ...