Vulnerability identifier: #VU110342
Vulnerability risk: Medium
CVSSv4.0: N/A
CVE-ID:
CWE-ID:
CWE-22
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
PHP
Universal components / Libraries /
Scripting languages
Vendor: PHP Group
Description
The vulnerability allows a remote attacker to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the posix_access function in PHP 5.2.6 and earlier. A remote authenticated attacker can send a specially crafted HTTP request and remote attackers to bypass safe_mode restrictions via a . (dot dot) in an http URL, which results in the URL being canonicalized to a local filename after the safe_mode check has successfully run.
Mitigation
Install update from vendor's website.
Vulnerable software versions
PHP: 5.2, 5.2.0, 5.2.1, 5.2.2, 5.2.3, 5.2.4, 5.2.5, 5.2.6
External links
https://lists.apple.com/archives/security-announce/2009/May/msg00002.html
https://marc.info/?l=bugtraq&m=124654546101607&w=2
https://marc.info/?l=bugtraq&m=125631037611762&w=2
https://secunia.com/advisories/32746
https://secunia.com/advisories/35074
https://secunia.com/advisories/35650
https://security.gentoo.org/glsa/glsa-200811-05.xml
https://securityreason.com/achievement_securityalert/54
https://securityreason.com/securityalert/3941
https://support.apple.com/kb/HT3549
https://wiki.rpath.com/Advisories:rPSA-2009-0035
https://www.securityfocus.com/archive/1/501376/100/0/threaded
https://www.securityfocus.com/bid/29797
https://www.securitytracker.com/id?1020327
https://www.us-cert.gov/cas/techalerts/TA09-133A.html
https://www.vupen.com/english/advisories/2009/1297
https://exchange.xforce.ibmcloud.com/vulnerabilities/43196
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.