PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://marc.info/?l=bugtraq&m=125631037611762&w=2 | vendor advisory |
http://marc.info/?l=bugtraq&m=124654546101607&w=2 | vendor advisory |
http://www.securityfocus.com/archive/1/501376/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/47318 | vdb entry |
http://wiki.rpath.com/Advisories:rPSA-2009-0035 | |
http://www.securityfocus.com/bid/32688 | vdb entry |
http://secunia.com/advisories/35003 | third party advisory |
http://www.php.net/ChangeLog-5.php#5.2.7 | |
http://www.mandriva.com/security/advisories?name=MDVSA-2009:045 | vendor advisory |
http://osvdb.org/50483 | vdb entry |
http://securityreason.com/achievement_securityalert/59 | third party advisory exploit |
http://osvdb.org/52207 | vdb entry |
http://www.securityfocus.com/archive/1/498985/100/0/threaded | mailing list |
http://secunia.com/advisories/35650 | third party advisory |
http://www.debian.org/security/2009/dsa-1789 | vendor advisory |