Description
The exec_dir PHP patch (php-exec-dir) 4.3.2 through 4.3.7 with safe mode disabled allows remote attackers to bypass restrictions and execute arbitrary commands via a backtick operator, which is not handled using the php_escape_shell_cmd function.
Exploits (1)
References (8)
Core 8
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16498
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2004/Jul/0347.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/7243
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/11928
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2004/Jul/0357.html
Patch x_refsource_confirm
http://kyberdigi.cz/projects/execdir/english.html
Mailing List mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2004/Jul/0350.html
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/10598
Scores
EPSS
0.0986
EPSS Percentile
93.0%
Details
CWE
CWE-16
CWE-264
Status
published
Products (6)
kyberdigi_labs/php-exec-dir
4.3.2
kyberdigi_labs/php-exec-dir
4.3.3
kyberdigi_labs/php-exec-dir
4.3.4
kyberdigi_labs/php-exec-dir
4.3.5
kyberdigi_labs/php-exec-dir
4.3.6
kyberdigi_labs/php-exec-dir
4.3.7
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026