7.5
CVSSv2

CVE-2008-5625

Published: 17/12/2008 Updated: 11/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

PHP 5 prior to 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent malicious users to write to arbitrary files by placing a "php_value error_log" entry in a .htaccess file.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.2.1

php php 5.2.2

php php 5.1.3

php php 5.1.2

php php 5.0.0

php php

php php 5.2.5

php php 5.1.6

php php 5.0.5

php php 5.0.4

php php 5.2.3

php php 5.2.4

php php 5.1.1

php php 5.1.0

php php 5.2.0

php php 5.1.5

php php 5.1.4

php php 5.0.3

php php 5.0.2

php php 5.0.1

Vendor Advisories

It was discovered that PHP did not properly enforce php_admin_value and php_admin_flag restrictions in the Apache configuration file A local attacker could create a specially crafted PHP script that would bypass intended security restrictions This issue only applied to Ubuntu 606 LTS, 710, and 804 LTS (CVE-2007-5900) ...

Exploits

[ SecurityReasoncom PHP 526 (error_log) safe_mode bypass ] Author: Maksymilian Arciemowicz (cXIb8O3) securityreasoncom Date: - - Written: 10112008 - - Public: 20112008 SecurityReason Research SecurityAlert Id: 57 CWE: CWE-264 SecurityRisk: Medium Affected Software: PHP 526 Advisory URL: securityreasoncom/achievement_securityal ...