session.c in the session extension in PHP prior to 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent malicious users to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
php php 5.2.3 |
||
php php 5.2.1 |
||
php php 5.2.2 |
||
php php 5.3.1 |
||
php php 5.0.0 |
||
php php 5.2.13 |
||
php php 5.2.11 |
||
php php 5.2.5 |
||
php php 5.2.0 |
||
php php 5.1.6 |
||
php php 5.1.4 |
||
php php 5.1.5 |
||
php php 5.0.5 |
||
php php 5.2.9 |
||
php php 5.2.4 |
||
php php 5.2.8 |
||
php php 5.1.0 |
||
php php 5.1.2 |
||
php php 5.0.4 |
||
php php 5.0.2 |
||
php php |
||
php php 5.2.10 |
||
php php 5.2.7 |
||
php php 5.2.6 |
||
php php 5.1.3 |
||
php php 5.1.1 |
||
php php 5.0.3 |
||
php php 5.0.1 |