Vulnerability Description
The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 5.2.0 |
Related Weaknesses (CWE)
References
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html
- http://secunia.com/advisories/38708Vendor Advisory
- http://secunia.com/advisories/40551
- http://securitytracker.com/id?1023661
- http://support.apple.com/kb/HT4312
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/releases/5_2_13.phpPatch
- http://www.securityfocus.com/bid/38431
- http://www.vupen.com/english/advisories/2010/0479Vendor Advisory
- http://www.vupen.com/english/advisories/2010/1796
- http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083
- http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html
- http://secunia.com/advisories/38708Vendor Advisory
- http://secunia.com/advisories/40551
FAQ
What is CVE-2010-1129?
CVE-2010-1129 is a vulnerability with a CVSS score of 7.5 (HIGH). The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended acc...
How severe is CVE-2010-1129?
CVE-2010-1129 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2010-1129?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.