CVE-2010-1130
Published: 26 March 2010
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
Notes
Author | Note |
---|---|
mdeslaur | actually fixed in 5.3.2 open_basedir and safe_mode issue dapper doesn't try and strip ; chars, so not vulnerable |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
dapper |
Not vulnerable
(5.1.2-1ubuntu3.18)
|
hardy |
Released
(5.2.4-2ubuntu5.12)
|
|
intrepid |
Ignored
(end of life, was needed)
|
|
jaunty |
Released
(5.2.6.dfsg.1-3ubuntu4.6)
|
|
karmic |
Released
(5.2.10.dfsg.1-2ubuntu6.5)
|
|
lucid |
Not vulnerable
(5.3.2-1ubuntu3)
|
|
upstream |
Released
(5.2.13, 5.3.2)
|
|
Patches: upstream: http://svn.php.net/viewvc?view=revision&revision=294272 |