CVE-2006-5178
Severity CVSS v4.0:
Pending analysis
Type:
CWE-362
Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
Publication date:
10/10/2006
Last modified:
09/04/2025
Description
Race condition in the symlink function in PHP 5.1.6 and earlier allows local users to bypass the open_basedir restriction by using a combination of symlink, mkdir, and unlink functions to change the file path after the open_basedir check and before the file is opened by the underlying system, as demonstrated by symlinking a symlink into a subdirectory, to point to a parent directory via .. (dot dot) sequences, and then unlinking the resulting symlink.
Impact
Base Score 2.0
6.20
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* | 5.1.6 (including) | |
cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049850.html
- http://secunia.com/advisories/22235
- http://secunia.com/advisories/22424
- http://securityreason.com/securityalert/1692
- http://securitytracker.com/id?1016977=
- http://www.hardened-php.net/advisory_082006.132.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A185
- http://www.neosecurityteam.net/index.php?action=advisories&id=26
- http://www.securityfocus.com/archive/1/447649/100/0/threaded
- http://www.securityfocus.com/archive/1/448020/100/0/threaded
- http://www.securityfocus.com/archive/1/448953/100/0/threaded
- http://www.securityfocus.com/bid/20326
- http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
- http://www.vupen.com/english/advisories/2006/3901
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29340
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-October/049850.html
- http://secunia.com/advisories/22235
- http://secunia.com/advisories/22424
- http://securityreason.com/securityalert/1692
- http://securitytracker.com/id?1016977=
- http://www.hardened-php.net/advisory_082006.132.html
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A185
- http://www.neosecurityteam.net/index.php?action=advisories&id=26
- http://www.securityfocus.com/archive/1/447649/100/0/threaded
- http://www.securityfocus.com/archive/1/448020/100/0/threaded
- http://www.securityfocus.com/archive/1/448953/100/0/threaded
- http://www.securityfocus.com/bid/20326
- http://www.turbolinux.com/security/2006/TLSA-2006-38.txt
- http://www.vupen.com/english/advisories/2006/3901
- https://exchange.xforce.ibmcloud.com/vulnerabilities/29340