CVE-2007-1835
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
03/04/2007
Last modified:
09/04/2025
Description
PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.
Impact
Base Score 2.0
4.60
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0:beta_4_patch1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0:beta1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0:beta2:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0:beta3:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0:beta4:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0:rc1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0:rc2:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
- http://secunia.com/advisories/25423
- http://secunia.com/advisories/25850
- http://www.php-security.org/MOPB/MOPB-36-2007.html
- http://www.securityfocus.com/bid/23183
- http://www.vupen.com/english/advisories/2007/1991
- http://www.vupen.com/english/advisories/2007/2374
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33550
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137
- http://secunia.com/advisories/25423
- http://secunia.com/advisories/25850
- http://www.php-security.org/MOPB/MOPB-36-2007.html
- http://www.securityfocus.com/bid/23183
- http://www.vupen.com/english/advisories/2007/1991
- http://www.vupen.com/english/advisories/2007/2374
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33550



