Computer Security
[EN] securityvulns.ru no-pyccku


PHP open_basedir protection bypass
updated since 04.10.2006
Published:09.10.2006
Source:
SecurityVulns ID:6681
Type:local
Threat Level:
5/10
Description:By using symbolic links in race period of time it's possible to bypass open_basedir protection.
Affected:PHP : PHP 4.4
 PHP : PHP 5.2
Original documentdocumentpaisterist.nst_(at)_gmail.com, PHP open_basedir with symlink() function Race Condition PoC exploit (09.10.2006)
 documentStefan Esser, Advisory 08/2006: PHP open_basedir Race Condition Vulnerability (04.10.2006)

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod