Vulnerability Description
The libxml RSHUTDOWN function in PHP 5.x allows remote attackers to bypass the open_basedir protection mechanism and read arbitrary files via vectors involving a stream_close method call during use of a custom stream wrapper.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Php | Php | 5.0.0 |
Related Weaknesses (CWE)
References
- https://bugs.php.net/bug.php?id=61367
- https://bugzilla.redhat.com/show_bug.cgi?id=802591
- https://github.com/php/php-src/blob/master/ext/libxml/tests/bug61367-read.phptVendor Advisory
- https://github.com/php/php-src/blob/master/ext/libxml/tests/bug61367-write.phpt
- https://bugs.php.net/bug.php?id=61367
- https://bugzilla.redhat.com/show_bug.cgi?id=802591
- https://github.com/php/php-src/blob/master/ext/libxml/tests/bug61367-read.phptVendor Advisory
- https://github.com/php/php-src/blob/master/ext/libxml/tests/bug61367-write.phpt
FAQ
What is CVE-2012-1171?
CVE-2012-1171 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The libxml RSHUTDOWN function in PHP 5.x allows remote attackers to bypass the open_basedir protection mechanism and read arbitrary files via vectors involving a stream_close method call during use of...
How severe is CVE-2012-1171?
CVE-2012-1171 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2012-1171?
Check the references section above for vendor advisories and patch information. Affected products include: Php Php.