CVE-2004-1063

PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name. NOTE: this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:*

History

No history.

Information

Published : 2005-01-10 05:00

Updated : 2024-02-04 16:52


NVD link : CVE-2004-1063

Mitre link : CVE-2004-1063

CVE.ORG link : CVE-2004-1063


JSON object : View

Products Affected

canonical

  • ubuntu_linux

php

  • php