5
CVSSv2

CVE-2010-1130

Published: 26/03/2010 Updated: 30/10/2018
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
VMScore: 505
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

session.c in the session extension in PHP prior to 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent malicious users to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).

Vulnerable Product Search on Vulmon Subscribe to Product

php php 5.2.3

php php 5.2.1

php php 5.2.2

php php 5.3.1

php php 5.0.0

php php 5.2.13

php php 5.2.11

php php 5.2.5

php php 5.2.0

php php 5.1.6

php php 5.1.4

php php 5.1.5

php php 5.0.5

php php 5.2.9

php php 5.2.4

php php 5.2.8

php php 5.1.0

php php 5.1.2

php php 5.0.4

php php 5.0.2

php php

php php 5.2.10

php php 5.2.7

php php 5.2.6

php php 5.1.3

php php 5.1.1

php php 5.0.3

php php 5.0.1

Vendor Advisories

Auke van Slooten discovered that PHP incorrectly handled certain xmlrpc requests An attacker could exploit this issue to cause the PHP server to crash, resulting in a denial of service This issue only affected Ubuntu 606 LTS, 804 LTS, 904 and 910 (CVE-2010-0397) ...

Exploits

source: wwwsecurityfocuscom/bid/38182/info PHP is prone to a 'safe_mode' restriction-bypass vulnerability Successful exploits could allow an attacker to write session files in arbitrary directions This vulnerability would be an issue in shared-hosting configurations where multiple users can create and execute arbitrary PHP script code; ...