Vulnerability Name: CVE-2006-4483 (CCN-32946) Assigned: 2006-08-17 Published: 2006-08-17 Updated: 2022-07-19 Summary: The cURL extension files (1) ext/curl/interface.c and (2) ext/curl/streams.c in PHP before 5.1.5 permit the CURLOPT_FOLLOWLOCATION option when open_basedir or safe_mode is enabled, which allows attackers to perform unauthorized actions, possibly related to the realpath cache. CVSS v3 Severity: 4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): LowAvailibility (A): None
CVSS v2 Severity: 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C )6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): NoneImpact Metrics: Confidentiality (C): CompleteIntegrity (I): CompleteAvailibility (A): Complete
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N )1.6 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
Vulnerability Type: CWE-862 Vulnerability Consequences: Bypass Security References: Source: MITRE Type: CNACVE-2006-4483 Source: MISC Type: Broken Link, Patchhttp://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?r1=1.62.2.14.2.6&r2=1.62.2.14.2.7 Source: CONFIRM Type: Broken Link, Patchhttp://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?view=log Source: MISC Type: Broken Link, Patchhttp://cvs.php.net/viewvc.cgi/php-src/ext/curl/streams.c?r1=1.14.2.2.2.3&r2=1.14.2.2.2.4 Source: CCN Type: SA21546PHP Multiple Vulnerabilities Source: SECUNIA Type: Not Applicable, Patch, Vendor Advisory21546 Source: SECUNIA Type: Not Applicable22039 Source: SECUNIA Type: Not Applicable30411 Source: CCN Type: SECTRACK ID: 1016984PHP Heap Overflows and Other Bugs Let Users Execute Arbitrary Code or Cause Denial of Service Conditions Source: SECTRACK Type: Broken Link, Third Party Advisory, VDB Entry1016984 Source: CCN Type: The PHP Group Web sitePHP 5.1.5 Release Announcement Source: CONFIRM Type: Broken Linkhttp://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178 Source: SUSE Type: Broken LinkSUSE-SA:2006:052 Source: CCN Type: OSVDB ID: 27999PHP cURL CURLOPT_FOLLOWLOCATION open_basedir/safe_mode Bypass Source: CONFIRM Type: Release Notes, Vendor Advisoryhttp://www.php.net/ChangeLog-5.php#5.1.5 Source: CONFIRM Type: Patch, Release Notes, Vendor Advisoryhttp://www.php.net/release_5_1_5.php Source: BUGTRAQ Type: Third Party Advisory, VDB Entry20080527 rPSA-2008-0178-1 php php-mysql php-pgsql Source: BID Type: Third Party Advisory, VDB Entry19582 Source: CCN Type: BID-19582PHP Multiple Input Validation Vulnerabilities Source: CCN Type: USN-320-1PHP vulnerabilities Source: CCN Type: USN-320-2PHP regression Source: VUPEN Type: Permissions RequiredADV-2006-3318 Source: XF Type: UNKNOWNphp-curl-security-bypass(32946) Source: SUSE Type: SUSE-SA:2006:052php4php5 security update Vulnerable Configuration: Configuration 1 :cpe:/a:php:php:*:*:*:*:*:*:*:* (Version < 5.1.5)Configuration CCN 1 :cpe:/a:php:php:5.0.3:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:* OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:* OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:* OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:* OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:* OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:* AND cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/a:suse:suse_linux_school_server:-:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0::oss:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.1::personal:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/a:novell:open_enterprise_server:*:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
php php *
php php 5.0.3
php php 5.0.4
php php 5.0.0
php php 5.0.5
php php 5.1.1
php php 5.1.2
php php 5.1.4
php php 5.0.2
php php 5.0.0 beta1
php php 5.0.0 beta2
php php 5.0.0 beta3
php php 5.0.0 beta4
php php 5.0.0 rc1
php php 5.0.0 rc2
php php 5.0.0 rc3
php php 5.0.1
php php 5.1.0
php php 5.1.3
suse linux enterprise server 8
suse suse linux school server -
suse suse linux 9.2
mandrakesoft mandrake linux corporate server 3.0
novell open enterprise server *
mandrakesoft mandrake multi network firewall 2.0
suse suse linux 10.0
mandrakesoft mandrake linux 2006
canonical ubuntu 6.06
suse suse linux 10.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux corporate server 3.0
novell open enterprise server *
suse suse linux 9.3