Vulnerability Name:

CVE-2001-1247 (CCN-11665)

Assigned:2001-06-30
Published:2001-06-30
Updated:2012-06-25
Summary:PHP 4.0.4pl1 and 4.0.5 in safe mode allows remote attackers to read and write files owned by the web server UID by uploading a PHP script that uses the error_log function to access the files.
CVSS v3 Severity:6.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
6.4 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-264
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: BugTraq Mailing List, Sat Jun 30 2001 - 05:40:06 CDT
php breaks safe mode

Source: MITRE
Type: CNA
CVE-2001-1247

Source: BUGTRAQ
Type: Exploit, Patch, Vendor Advisory
20010630 php breaks safe mode

Source: CCN
Type: RHSA-2002-035
Updated PHP packages are available [updated 2002-Mar-11]

Source: OSVDB
Type: UNKNOWN
5440

Source: CCN
Type: OSVDB ID: 5440
PHP mail() command Arbitrary Remote File Access

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz

Source: REDHAT
Type: Patch, Vendor Advisory
RHSA-2002:035

Source: XF
Type: UNKNOWN
php-errorlog-safemode-bypass(11665)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:4.0.4pl1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:4.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:4.0.4:-:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    php php 4.0.4pl1
    php php 4.0.5
    php php 4.0.5 -
    php php 4.0.4 -
    redhat linux 6.2
    redhat linux 7
    redhat linux 7.1
    redhat linux 7.2