Vulnerability Description
PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent attackers to write to arbitrary files by placing a "php_value error_log" entry in a .htaccess file.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | <= 5.2.6 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/bugtraq/2008-11/0152.html
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
- http://marc.info/?l=bugtraq&m=125631037611762&w=2
- http://osvdb.org/52205
- http://secunia.com/advisories/35650
- http://securityreason.com/achievement_securityalert/57Exploit
- http://wiki.rpath.com/Advisories:rPSA-2009-0035
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:045
- http://www.php.net/ChangeLog-5.php#5.2.7
- http://www.securityfocus.com/archive/1/501376/100/0/threaded
- http://www.securityfocus.com/bid/32383
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47314
- https://www.exploit-db.com/exploits/7171
- http://archives.neohapsis.com/archives/bugtraq/2008-11/0152.html
- http://marc.info/?l=bugtraq&m=124654546101607&w=2
FAQ
What is CVE-2008-5625?
CVE-2008-5625 is a vulnerability with a CVSS score of 7.5 (HIGH). PHP 5 before 5.2.7 does not enforce the error_log safe_mode restrictions when safe_mode is enabled through a php_admin_flag setting in httpd.conf, which allows context-dependent attackers to write to ...
How severe is CVE-2008-5625?
CVE-2008-5625 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2008-5625?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.