PHP Safe Mode mail Function 5th Parameter Arbitrary Command Execution

medium Nessus Plugin ID 10701

Synopsis

Arbitrary commands may be run on the remote server.

Description

The remote host is running PHP 4.0.5.

There is a flaw in this version of PHP that allows local users to circumvent the safe mode and to gain the UID of the HTTP process.

Solution

Upgrade to PHP 4.1.0.

Plugin Details

Severity: Medium

ID: 10701

File Name: php_safe_mode.nasl

Version: 1.29

Type: remote

Family: CGI abuses

Published: 7/2/2001

Updated: 11/22/2024

Configuration: Enable thorough checks

Supported Sensors: Nessus

Enable CGI Scanning: true

Risk Information

VPR

Risk Factor: Medium

Score: 6.3

CVSS v2

Risk Factor: Medium

Base Score: 4.6

Temporal Score: 3.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: cpe:/a:php:php

Required KB Items: www/PHP

Exploit Ease: No exploit is required

Vulnerability Publication Date: 6/30/2001

Reference Information

CVE: CVE-2001-1246

BID: 2954