Vulnerability Name: CVE-2004-1063 (CCN-18511) Assigned: 2004-12-15 Published: 2004-12-15 Updated: 2020-12-08 Summary: PHP 4.x to 4.3.9, and PHP 5.x to 5.0.2, when running in safe mode on a multithreaded Unix webserver, allows local users to bypass safe_mode_exec_dir restrictions and execute commands outside of the intended safe_mode_exec_dir via shell metacharacters in the current directory name. Note : this issue was originally REJECTed by its CNA before publication, but that decision is in active dispute. This candidate may change significantly in the future as a result of further discussion. CVSS v3 Severity: 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): ChangedImpact Metrics: Confidentiality (C): HighIntegrity (I): HighAvailibility (A): High
CVSS v2 Severity: 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
Vulnerability Type: CWE-noinfo Vulnerability Consequences: Bypass Security References: Source: CCN Type: BugTraq Mailing List, Wed Dec 15 2004 - 12:46:20 CST Advisory 01/2004: Multiple vulnerabilities in PHP 4/5 Source: MITRE Type: CNACVE-2004-1063 Source: CONECTIVA Type: Broken LinkCLA-2005:915 Source: CCN Type: CIAC Information Bulletin P-116Apple Security Update 2005-001 for Mac OS X Source: CCN Type: GLSA-200412-14PHP: Multiple vulnerabilities Source: GENTOO Type: Third Party AdvisoryGLSA-200412-14 Source: MISC Type: Third Party Advisoryhttp://www.hardened-php.net/advisories/012004.txt Source: MANDRAKE Type: Third Party AdvisoryMDKSA-2004:151 Source: MANDRAKE Type: Third Party AdvisoryMDKSA-2005:072 Source: CCN Type: OpenPKG-SA-2004.053PHP Source: OSVDB Type: Broken Link12412 Source: CCN Type: OSVDB ID: 12412PHP Multithreaded safe_mode_exec_dir Restriction Bypass Source: CCN Type: PHP Web sitePHP 4.3.10 Release Announcement Source: CONFIRM Type: Release Notes, Vendor Advisoryhttp://www.php.net/release_4_3_10.php Source: HP Type: Third Party Advisory, VDB EntryHPSBMA01212 Source: BUGTRAQ Type: Third Party Advisory, VDB Entry20041215 Advisory 01/2004: Multiple vulnerabilities in PHP 4/5 Source: BID Type: Third Party Advisory, VDB Entry11964 Source: CCN Type: BID-11964PHP Multiple Local And Remote Vulnerabilities Source: CCN Type: TLSA-2005-50Multiple vulnerabilities exist in php Source: CCN Type: USN-99-1PHP4 vulnerabilities Source: XF Type: Third Party Advisory, VDB Entryphp-safemodeexecdir-restriction-bypass(18511) Source: XF Type: UNKNOWNphp-safemodeexecdir-restriction-bypass(18511) Source: UBUNTU Type: Third Party AdvisoryUSN-99-1 Vulnerable Configuration: Configuration 1 :cpe:/a:php:php:*:*:*:*:*:*:*:* (Version >= 4.0.0 and <= 4.3.9)OR cpe:/a:php:php:*:*:*:*:*:*:*:* (Version >= 5.0.0 and <= 5.0.2) Configuration 2 :cpe:/o:canonical:ubuntu_linux:4.10:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:php:php:4.0.5:-:*:*:*:*:*:* OR cpe:/a:php:php:4.1.1:*:*:*:*:*:*:* OR cpe:/a:php:php:4.2.0:-:*:*:*:*:*:* OR cpe:/a:php:php:4.2.1:-:*:*:*:*:*:* OR cpe:/a:php:php:4.2.3:-:*:*:*:*:*:* OR cpe:/a:php:php:4.2.2:*:*:*:*:*:*:* OR cpe:/a:php:php:4.3.0:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.4:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.9:*:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.3:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0.0:*:*:*:*:*:*:* OR cpe:/a:php:php:4.0.1:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0.2:*:*:*:*:*:*:* OR cpe:/a:php:php:4.0.3:*:*:*:*:*:*:* OR cpe:/a:php:php:4.0.4:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0.6:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0.7:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta_4_patch1:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta1:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta2:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta3:*:*:*:*:*:* OR cpe:/a:php:php:4.0:beta4:*:*:*:*:*:* OR cpe:/a:php:php:4.1.0:-:*:*:*:*:*:* OR cpe:/a:php:php:4.1.2:*:*:*:*:*:*:* OR cpe:/a:php:php:4.3.1:*:*:*:*:*:*:* OR cpe:/a:php:php:4.3.2:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.5:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.6:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.7:-:*:*:*:*:*:* OR cpe:/a:php:php:4.3.8:*:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:* OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:* OR cpe:/a:php:php:4.0:rc1:*:*:*:*:*:* OR cpe:/a:php:php:4.0:rc2:*:*:*:*:*:* AND cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:* OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.1:*:*:*:*:*:*:* OR cpe:/a:openpkg:openpkg:2.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.1::x86-64:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:home:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:9.2::amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:10.0::amd64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1::x86_64:*:*:*:*:* Denotes that component is vulnerable BACK
php php *
php php *
canonical ubuntu linux 4.10
php php 4.0.5
php php 4.1.1
php php 4.2.0
php php 4.2.1
php php 4.2.3
php php 4.2.2
php php 4.3.0
php php 4.3.4
php php 4.3.9
php php 5.0.0
php php 4.3.3
php php 5.0.2
php php 4.0.0
php php 4.0.1
php php 4.0.2
php php 4.0.3
php php 4.0.4
php php 4.0.6
php php 4.0.7
php php 4.0 beta_4_patch1
php php 4.0 beta1
php php 4.0 beta2
php php 4.0 beta3
php php 4.0 beta4
php php 4.1.0
php php 4.1.2
php php 4.3.1
php php 4.3.2
php php 4.3.5
php php 4.3.6
php php 4.3.7
php php 4.3.8
php php 5.0.0 beta1
php php 5.0.0 beta2
php php 5.0.0 beta3
php php 5.0.0 beta4
php php 5.0.0 rc1
php php 5.0.0 rc2
php php 5.0.0 rc3
php php 5.0.1
php php 4.0 rc1
php php 4.0 rc2
openpkg openpkg current
gentoo linux *
mandrakesoft mandrake linux corporate server 2.1
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
openpkg openpkg 2.1
openpkg openpkg 2.2
mandrakesoft mandrake linux 10.1
mandrakesoft mandrake linux 10.1
turbolinux turbolinux home *
mandrakesoft mandrake linux 9.2
mandrakesoft mandrake linux 10.0
mandrakesoft mandrake linux corporate server 2.1