CVE-2006-6383

PHP 5.2.0-4.4 - Auth Bypass

Title source: llm
STIX 2.1

Description

PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Maksymilian Arciemowicz · textlocalphp
https://www.exploit-db.com/exploits/29239

References (10)

Core 10
Core References
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/24022
Vendor Advisory vendor-advisory x_refsource_openpkg
http://www.openpkg.com/security/advisories/OpenPKG-SA-2007.010.html
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/453938/30/9270/threaded
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/24514
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/2000
Vendor Advisory vendor-advisory x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDKSA-2007:038
Exploit third-party-advisory x_refsource_sreasonres
http://securityreason.com/achievement_securityalert/43
Various Sources vendor-advisory x_refsource_suse
http://lists.suse.com/archive/suse-security-announce/2007-Mar/0003.html
Exploit vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/21508

Scores

EPSS 0.0053
EPSS Percentile 67.5%

Details

CWE
CWE-20
Status published
Products (2)
php/php 4.4.0
php/php 5.2.0
Published Dec 10, 2006
Tracked Since Feb 18, 2026