Vulnerabilità: CVE-2007-3378

La (1) session_save_path, (2) ini_set, e (3) funzioni error_log in PHP 4.4.7 e precedenti, e PHP 5 5.2.3 e versioni precedenti, quando richiamato da un file .htaccess, permettono ad aggressori remoti di bypass safe_mode e open_basedir restrizioni ed eventualmente eseguire comandi arbitrari, come dimostrato mediante (a) php_value, (b) php_flag, e (c) le direttive in .htaccess.


http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
http://www.securityfocus.com/bid/24661
http://www.securityfocus.com/bid/25498
http://www.securityfocus.com/archive/1/472343/100/0/threaded
http://docs.info.apple.com/article.html?artnum=307562
http://www.php.net/ChangeLog-4.php
http://www.php.net/ChangeLog-5.php#5.2.4
http://www.php.net/ChangeLog-5.php#5.2.5
http://www.php.net/releases/4_4_8.php
http://www.php.net/releases/5_2_4.php
http://www.php.net/releases/5_2_5.php
https://issues.rpath.com/browse/RPL-1693
https://issues.rpath.com/browse/RPL-1702
http://seclists.org/fulldisclosure/2020/Sep/34
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
http://www.securityfocus.com/archive/1/491693/100/0/threaded
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01345501
http://www.securityfocus.com/archive/1/491693/100/0/threaded
http://securityreason.com/achievement_exploitalert/9
http://www.openwall.com/lists/oss-security/2020/09/17/3
http://www.osvdb.org/38682
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6056
http://secunia.com/advisories/26642
http://secunia.com/advisories/26822
http://secunia.com/advisories/26838
http://secunia.com/advisories/27102
http://secunia.com/advisories/27377
http://secunia.com/advisories/27648
http://secunia.com/advisories/28318
http://secunia.com/advisories/28750
http://secunia.com/advisories/28936
http://secunia.com/advisories/29420
http://secunia.com/advisories/30040
http://slackware.com/security/viewer.php?l=slackware-security&y=2008&m=slackware-security.335136
http://securityreason.com/securityalert/2831
http://securityreason.com/securityalert/3389
http://securityreason.com/achievement_securityalert/45
http://www.trustix.org/errata/2007/0026/
http://www.vupen.com/english/advisories/2007/3023
http://www.vupen.com/english/advisories/2008/0059
http://www.vupen.com/english/advisories/2008/0398
http://www.vupen.com/english/advisories/2008/0924/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/35102
https://exchange.xforce.ibmcloud.com/vulnerabilities/39403
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-3378


E' possibile lasciare un commento come utenti registrati al sito, accedendo tramite social, account wordpress oppure come utenti anonimi. Nel caso in cui si desideri lasciare un commento come utenti anonimi si verrà avvisati via email di un'eventuale risposta solo se si inserisce l'indirizzo email (facoltativo). L'inserimento di qualsiasi dato nei campi dei commenti è totalmente facoltativo. Chiunque decida di inserire un qualsiasi dato accetta il trattamento di questi ultimi per i fini inerenti al servizio ovvero la risposta al commento e le comunicazioni strettamente necessarie.


Rispondi