CVE-2009-3558

Published Nov 23, 2009

Last updated 6 years ago

Overview

Description
The posix_mkfifo function in ext/posix/posix.c in PHP before 5.2.12 and 5.3.x before 5.3.1 allows context-dependent attackers to bypass open_basedir restrictions, and create FIFO files, via the pathname and mode arguments, as demonstrated by creating a .htaccess file.
Source
secalert@redhat.com
NVD status
Modified

Social media

Hype score
Not currently trending

Risk scores

CVSS 2.0

Type
Primary
Base score
6.8
Impact score
6.4
Exploitability score
8.6
Vector string
AV:N/AC:M/Au:N/C:P/I:P/A:P

Weaknesses

nvd@nist.gov
CWE-264

Evaluator

Comment
-
Impact
Access Complexity selected medium according to the information from X-force link regarding enabling "open_basedir" option. http://xforce.iss.net/xforce/xfdb/53568
Solution
Access Complexity selected medium according to the information from X-force link regarding enabling "open_basedir" option. http://xforce.iss.net/xforce/xfdb/53568

Vendor comments

  • Red HatWe do not consider safe_mode / open_basedir restriction bypass issues being security sensitive. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php

Configurations