Lucene search

K
exploitdbGrzegorz StachowiakEDB-ID:33625
HistoryFeb 11, 2010 - 12:00 a.m.

PHP 5.3.1 - 'session_save_path() Safe_mode()' Restriction Bypass Exploiot

2010-02-1100:00:00
Grzegorz Stachowiak
www.exploit-db.com
34

AI Score

7.4

Confidence

Low

EPSS

0.025

Percentile

90.3%

source: https://www.securityfocus.com/bid/38182/info

PHP is prone to a 'safe_mode' restriction-bypass vulnerability. Successful exploits could allow an attacker to write session files in arbitrary directions.

This vulnerability would be an issue in shared-hosting configurations where multiple users can create and execute arbitrary PHP script code; the 'safe_mode' restrictions are assumed to isolate users from each other. 

{

session_save_path(";;/byp/;a/../../humhum");
session_start();

}

AI Score

7.4

Confidence

Low

EPSS

0.025

Percentile

90.3%