Vulnerability Description
The cURL library (libcurl) in PHP 4.4.2 and 5.1.4 allows attackers to bypass safe mode and read files via a file:// request containing null characters.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 4.4.2 |
References
- http://secunia.com/advisories/20337
- http://secunia.com/advisories/21050
- http://secunia.com/advisories/21847
- http://secunia.com/advisories/22039
- http://securityreason.com/achievement_securityalert/39
- http://securityreason.com/securityalert/959
- http://securitytracker.com/id?1016175
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:122
- http://www.novell.com/linux/security/advisories/2006_22_sr.html
- http://www.novell.com/linux/security/advisories/2006_52_php.html
- http://www.securityfocus.com/bid/18116
- http://www.vupen.com/english/advisories/2006/2055
- https://exchange.xforce.ibmcloud.com/vulnerabilities/26764
- http://secunia.com/advisories/20337
- http://secunia.com/advisories/21050
FAQ
What is CVE-2006-2563?
CVE-2006-2563 is a vulnerability with a CVSS score of 2.1 (LOW). The cURL library (libcurl) in PHP 4.4.2 and 5.1.4 allows attackers to bypass safe mode and read files via a file:// request containing null characters.
How severe is CVE-2006-2563?
CVE-2006-2563 has been rated LOW with a CVSS base score of 2.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-2563?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.