CVE-2007-3007
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
04/06/2007
Last modified:
09/04/2025
Description
PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this issue might also involve the realpath function.
Impact
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:php:php:*:*:*:*:*:*:*:* | 5.0.0 (including) | 5.2.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://bugs.php.net/bug.php?id=41492
- http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
- http://osvdb.org/36084
- http://secunia.com/advisories/25456
- http://secunia.com/advisories/26048
- http://secunia.com/advisories/26231
- http://secunia.com/advisories/27102
- http://secunia.com/advisories/27110
- http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
- http://www.php.net/releases/5_2_3.php
- http://www.securityfocus.com/bid/24259
- http://www.trustix.org/errata/2007/0023/
- https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
- http://bugs.php.net/bug.php?id=41492
- http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
- http://osvdb.org/36084
- http://secunia.com/advisories/25456
- http://secunia.com/advisories/26048
- http://secunia.com/advisories/26231
- http://secunia.com/advisories/27102
- http://secunia.com/advisories/27110
- http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
- http://www.php.net/releases/5_2_3.php
- http://www.securityfocus.com/bid/24259
- http://www.trustix.org/errata/2007/0023/
- https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html