Vulnerability Description
PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 5.0.0 |
Related Weaknesses (CWE)
References
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://osvdb.org/50483
- http://osvdb.org/52207
- http://secunia.com/advisories/35003
- http://secunia.com/advisories/35650
- http://securityreason.com/achievement_securityalert/59Exploit
- http://wiki.rpath.com/Advisories:rPSA-2009-0035
- http://www.debian.org/security/2009/dsa-1789
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:045
- http://www.php.net/ChangeLog-5.php#5.2.7
- http://www.securityfocus.com/archive/1/498985/100/0/threaded
- http://www.securityfocus.com/archive/1/501376/100/0/threaded
- http://www.securityfocus.com/bid/32688
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47318
FAQ
What is CVE-2008-5624?
CVE-2008-5624 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restric...
How severe is CVE-2008-5624?
CVE-2008-5624 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5624?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.