7.5
CVSSv2

CVE-2009-4018

Published: 29/11/2009 Updated: 30/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The proc_open function in ext/standard/proc_open.c in PHP prior to 5.2.11 and 5.3.x prior to 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent malicious users to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable.

Vulnerable Product Search on Vulmon Subscribe to Product

php php 4.3.1

php php 4.3.2

php php 4.1.0

php php 4.2.1

php php 4.4.7

php php 5.0

php php 4.3.9

php php 4.4.0

php php 5.0.4

php php 5.0.3

php php 5.0.0

php php 1.0

php php 4

php php 3.0.2

php php 3.0.18

php php 4.0

php php 3.0.9

php php 4.0.1

php php 4.0.5

php php 4.0.4

php php 4.3.11

php php 4.3.4

php php 4.2.3

php php 4.4.1

php php 4.4.2

php php 2.0b10

php php 2.0

php php 3.0.11

php php 3.0.10

php php 3.0.4

php php 3.0.3

php php 3.0.7

php php 4.0.0

php php 4.0.3

php php 4.0.7

php php 5.1.4

php php 5.1.5

php php 5.2.9

php php

php php 5.1.2

php php 5.1.3

php php 5.2.4

php php 5.2.2

php php 5.2.0

php php 4.3.10

php php 4.3.5

php php 4.2.0

php php 4.4.5

php php 4.4.6

php php 4.3.7

php php 4.3.8

php php 5.1.0

php php 5.0.5

php php 5.0.2

php php 5.0.1

php php 4.4.9

php php 5

php php 3.0.1

php php 3.0

php php 3.0.16

php php 3.0.6

php php 4.0.6

php php 4.1.2

php php 4.1.1

php php 5.1.1

php php 5.2.7

php php 5.2.6

php php 4.3.3

php php 4.3.6

php php 4.2.2

php php 4.3.0

php php 4.4.3

php php 4.4.4

php php 4.4.8

php php 4.2

php php 3.0.13

php php 3.0.12

php php 3.0.15

php php 3.0.14

php php 3.0.17

php php 3.0.8

php php 3.0.5

php php 4.0.2

php php 5.1.6

php php 5.2.8

php php 5.3.0

Vendor Advisories

Maksymilian Arciemowicz discovered that PHP did not properly validate arguments to the dba_replace function If a script passed untrusted input to the dba_replace function, an attacker could truncate the database This issue only applied to Ubuntu 606 LTS, 804 LTS, and 810 (CVE-2008-7068) ...

Exploits

<?php /* Kolang (PHP Safe mode bypass) (IHSteam priv8 for lazy penetration testers) (php 4310 - 530) webnvdnistgov/view/vuln/detail?vulnId=CVE-2009-4018 (12/19/2009) wwwmilw0rmcom/exploits/7393 (12/09/2008) 1- Kolang can be used directly in file inclusion RFI&LFI vulnerabilities (no upload required) 2- Kolang can ex ...