3.6
CVSSv2

CVE-2006-4625

Published: 12/09/2006 Updated: 30/10/2018
CVSS v2 Base Score: 3.6 | Impact Score: 4.9 | Exploitability Score: 3.9
VMScore: 365
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:N

Vulnerability Summary

PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.0.1

php php 4.0.7

php php 4.2.1

php php 4.2.2

php php 4.3.3

php php 4.3.4

php php 4.4.2

php php 4.4.3

php php 5.0.5

php php 5.0

php php 5.1.5

php php 5.1.6

php php 4.0.2

php php 4.0.3

php php 4.2.3

php php 4.2

php php 4.3.0

php php 4.3.5

php php 4.3.6

php php 4.4.4

php php 5.0.0

php php 5.1.0

php php 4.0

php php 4.0.5

php php 4.0.6

php php 4.1.2

php php 4.2.0

php php 4.3.11

php php 4.3.2

php php 4.4.0

php php 4.4.1

php php 5.0.3

php php 5.0.4

php php 5.1.3

php php 5.1.4

php php 4.0.4

php php 4.1.0

php php 4.1.1

php php 4.3.1

php php 4.3.10

php php 4.3.8

php php 4.3.9

php php 5.0.1

php php 5.0.2

php php 5.1.1

php php 5.1.2

Vendor Advisories

The stripos() function did not check for invalidly long or empty haystack strings In an application that uses this function on arbitrary untrusted data this could be exploited to crash the PHP interpreter (CVE-2006-4485) ...
Debian Bug report logs - #391281 CVE-2006-4625: PHP Ini_Restore() Safe_Mode and Open_Basedir Restriction Bypass Vulnerability Package: libapache2-mod-php5; Maintainer for libapache2-mod-php5 is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for libapache2-mod-php5 is src:php5 (PTS, buildd, popcon) Rep ...
Debian Bug report logs - #453295 CVE-2007-6039: possible DoS Package: php5-common; Maintainer for php5-common is Debian PHP Maintainers <pkg-php-maint@listsaliothdebianorg>; Source for php5-common is src:php5 (PTS, buildd, popcon) Reported by: Steffen Joeris <steffenjoeris@skolelinuxde> Date: Wed, 28 Nov 2007 12 ...

Exploits

source: wwwsecurityfocuscom/bid/19933/info PHP is prone to a 'safe_mode' and 'open_basedir' restriction-bypass vulnerability Successful exploits could allow an attacker to access sensitive information or to write files in unauthorized locations This vulnerability would be an issue in shared-hosting configurations where multiple users c ...
PHP versions 516 and below and versions 444 and below suffer from a php_admin* bypass via ini_restore() ...