Vulnerabilidad en Vulnerabilidad en libcurl de PHP (CVE-2007-4850)
Gravedad CVSS v2.0:
MEDIA
Tipo:
CWE-264
Permisos, privilegios y/o control de acceso
Fecha de publicación:
25/01/2008
Última modificación:
09/04/2025
Descripción
curl/interface.c en la librería cURL (también conocido como libcurl) en PHP 5.2.4 y 5.2.5 permite a atacantes dependientes de contexto evitar las restricciones safe_mode y open_basedir, y leer ficheros de su elección mediante una petición file:// que contiene una secuencia \x00, una vulnerabilidad diferente de CVE-2006-2563.
Impacto
Puntuación base 2.0
5.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup
- http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html
- http://secunia.com/advisories/30048
- http://secunia.com/advisories/30411
- http://secunia.com/advisories/31200
- http://secunia.com/advisories/31326
- http://secunia.com/advisories/32222
- http://securityreason.com/achievement_securityalert/51
- http://securityreason.com/securityalert/3562
- http://support.apple.com/kb/HT3216
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A022
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A023
- http://www.openwall.com/lists/oss-security/2008/05/02/2
- http://www.php.net/ChangeLog-5.php
- http://www.securityfocus.com/archive/1/486856/100/0/threaded
- http://www.securityfocus.com/archive/1/492671/100/0/threaded
- http://www.securityfocus.com/bid/27413
- http://www.securityfocus.com/bid/29009
- http://www.securityfocus.com/bid/31681
- http://www.ubuntu.com/usn/usn-628-1
- http://www.vupen.com/english/advisories/2008/1412
- http://www.vupen.com/english/advisories/2008/2268
- http://www.vupen.com/english/advisories/2008/2780
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39852
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42134
- http://cvs.php.net/viewcvs.cgi/php-src/NEWS?revision=1.2027.2.547.2.1047&view=markup
- http://lists.apple.com/archives/security-announce//2008/Jul/msg00003.html
- http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2008-January/059849.html
- http://secunia.com/advisories/30048
- http://secunia.com/advisories/30411
- http://secunia.com/advisories/31200
- http://secunia.com/advisories/31326
- http://secunia.com/advisories/32222
- http://securityreason.com/achievement_securityalert/51
- http://securityreason.com/securityalert/3562
- http://support.apple.com/kb/HT3216
- http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A022
- http://www.mandriva.com/security/advisories?name=MDVSA-2009%3A023
- http://www.openwall.com/lists/oss-security/2008/05/02/2
- http://www.php.net/ChangeLog-5.php
- http://www.securityfocus.com/archive/1/486856/100/0/threaded
- http://www.securityfocus.com/archive/1/492671/100/0/threaded
- http://www.securityfocus.com/bid/27413
- http://www.securityfocus.com/bid/29009
- http://www.securityfocus.com/bid/31681
- http://www.ubuntu.com/usn/usn-628-1
- http://www.vupen.com/english/advisories/2008/1412
- http://www.vupen.com/english/advisories/2008/2268
- http://www.vupen.com/english/advisories/2008/2780
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39852
- https://exchange.xforce.ibmcloud.com/vulnerabilities/42134