Total vulnerabilities in the database
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
Software | From | Fixed in |
---|---|---|
php / php | 5.2.9 | 5.2.9.x |
php / php | 5.1.5 | 5.1.5.x |
php / php | 5.1.2 | 5.1.2.x |
php / php | 5.3.1 | 5.3.1.x |
php / php | 5.1.1 | 5.1.1.x |
php / php | 5.0.0-beta1 | 5.0.0-beta1.x |
php / php | 5.1.6 | 5.1.6.x |
php / php | 5.2.7 | 5.2.7.x |
php / php | 5.2.2 | 5.2.2.x |
php / php | 5.0.5 | 5.0.5.x |
php / php | 5.0.1 | 5.0.1.x |
php / php | 5.1.4 | 5.1.4.x |
php / php | 5.2.5 | 5.2.5.x |
php / php | 5.0.4 | 5.0.4.x |
php / php | - | 5.2.12.x |
php / php | 5.2.11 | 5.2.11.x |
php / php | 5.2.6 | 5.2.6.x |
php / php | 5.0.0-rc2 | 5.0.0-rc2.x |
php / php | 5.2.3 | 5.2.3.x |
php / php | 5.0.3 | 5.0.3.x |
php / php | 5.1.0 | 5.1.0.x |
php / php | 5.2.13 | 5.2.13.x |
php / php | 5.0.0-rc3 | 5.0.0-rc3.x |
php / php | 5.2.0 | 5.2.0.x |
php / php | 5.2.4 | 5.2.4.x |
php / php | 5.0.0-beta3 | 5.0.0-beta3.x |
php / php | 5.1.3 | 5.1.3.x |
php / php | 5.2.10 | 5.2.10.x |
php / php | 5.0.0-rc1 | 5.0.0-rc1.x |
php / php | 5.0.2 | 5.0.2.x |
php / php | 5.2.1 | 5.2.1.x |
php / php | 5.0.0-beta4 | 5.0.0-beta4.x |
php / php | 5.0.0 | 5.0.0.x |
php / php | 5.0.0-beta2 | 5.0.0-beta2.x |
php / php | 5.2.8 | 5.2.8.x |