PHP <= 5.2.5 Safe Mode Bypass

看板Bugtraq作者時間18年前 (2007/12/25 00:31), 編輯推噓0(000)
留言0則, 0人參與, 最新討論串1/3 (看更多)
########################## WwW.BugReport.ir =20 ######################################### # # AmnPardaz Security Research & Penetration Testing Group # # Title: PHP <=3D 5.2.5 Safe Mode Bypass # Vendor: http://www.php.net # Vulnerable Function: tempnam() # Vulnerable Version: tested on 5.2.5 , 5.2.4 (prior versions also may =20 be affected) # Platform : any # Exploitation: Local # Exploit: Available # Fix Available: No! ############################################################################= ####### #################### - Description: #################### "PHP is a widely-used general-purpose scripting language that is =20 especially suited for Web development and can be embedded into HTML." #################### - Vulnerability: #################### +--> Safe Mode Bypass string tempnam ( string dir, string prefix ) Creates a file with a unique filename in the specified directory. Quick review from the source shows that there is open_basedir check but not Safe mode! /main/php_open_temporary_file.c See the related exploit for more details #################### - POC #################### http://www.bugreport.ir/?/22/exploit Original advisory: http://www.bugreport.ir/?/22 #################### - Credit : #################### AmnPardaz Security Research & Penetration Testing Group Contact: admin[4t}bugreport{d0t]ir WwW.BugReport.ir WwW.AmnPardaz.com
文章代碼(AID): #17Rzxu00 (Bugtraq)
文章代碼(AID): #17Rzxu00 (Bugtraq)