5
CVSSv2

CVE-2007-4850

Published: 25/01/2008 Updated: 15/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

curl/interface.c in the cURL library (aka libcurl) in PHP 5.2.4 and 5.2.5 allows context-dependent malicious users to bypass safe_mode and open_basedir restrictions and read arbitrary files via a file:// request containing a \x00 sequence, a different vulnerability than CVE-2006-2563.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.2.4

php php 5.2.5

Vendor Advisories

It was discovered that PHP did not properly check the length of the string parameter to the fnmatch function An attacker could cause a denial of service in the PHP interpreter if a script passed untrusted input to the fnmatch function (CVE-2007-4782) ...

Exploits

source: wwwsecurityfocuscom/bid/27413/info PHP cURL is prone to a 'safe mode' security-bypass vulnerability Attackers can use this issue to gain access to restricted files, potentially obtaining sensitive information that may aid in further attacks The issue affects PHP 525 and 524 var_dump(curl_exec(curl_init("file://safe_mode ...

References

CWE-264http://securityreason.com/achievement_securityalert/51http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.htmlhttp://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markuphttp://www.securityfocus.com/bid/27413http://securityreason.com/securityalert/3562http://www.openwall.com/lists/oss-security/2008/05/02/2http://www.php.net/ChangeLog-5.phphttp://www.securityfocus.com/bid/29009http://secunia.com/advisories/30048http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.htmlhttp://www.ubuntu.com/usn/usn-628-1http://secunia.com/advisories/30411http://secunia.com/advisories/31200http://secunia.com/advisories/31326http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178http://www.securityfocus.com/bid/31681http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.htmlhttp://support.apple.com/kb/HT3216http://secunia.com/advisories/32222http://www.mandriva.com/security/advisories?name=MDVSA-2009:023http://www.mandriva.com/security/advisories?name=MDVSA-2009:022http://www.vupen.com/english/advisories/2008/1412http://www.vupen.com/english/advisories/2008/2268http://www.vupen.com/english/advisories/2008/2780https://exchange.xforce.ibmcloud.com/vulnerabilities/42134https://exchange.xforce.ibmcloud.com/vulnerabilities/39852http://www.securityfocus.com/archive/1/492671/100/0/threadedhttp://www.securityfocus.com/archive/1/486856/100/0/threadedhttps://usn.ubuntu.com/628-1/https://nvd.nist.govhttps://www.exploit-db.com/exploits/31053/