Vulnerability Name:
CVE-2007-5900 (CCN-38590)
Assigned:
2007-11-08
Published:
2007-11-08
Updated:
2018-10-15
Summary:
PHP before 5.2.5 allows local users to bypass protection mechanisms configured through php_admin_value or php_admin_flag in httpd.conf by using ini_set to modify arbitrary configuration variables, a different issue than
CVE-2006-4625
.
CVSS v3 Severity:
4.0 Medium
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
)
Exploitability Metrics:
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Low
Availibility (A):
None
CVSS v2 Severity:
6.9 Medium
(CVSS v2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
)
5.4 Medium
(Temporal CVSS v2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Medium
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
2.1 Low
(CCN CVSS v2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N
)
1.7 Low
(CCN Temporal CVSS v2 Vector:
AV:L/AC:L/Au:N/C:N/I:P/A:N/E:POC/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Local
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
None
Integrity (I):
Partial
Availibility (A):
None
Vulnerability Type:
CWE-264
Vulnerability Consequences:
Bypass Security
References:
Source: CCN
Type: PHP Bug #41561
Values set with php_admin_* in httpd.conf can be overwritten with ini_set()
Source: CONFIRM
Type: UNKNOWN
http://bugs.php.net/bug.php?id=41561
Source: MITRE
Type: CNA
CVE-2007-5900
Source: CCN
Type: HP Security Bulletin HPSBUX02332 SSRT080056 rev.1
HP-UX running Apache with PHP, Remote Denial of Service (DoS), Gain Extended Privileges
Source: CCN
Type: SA27648
PHP Multiple Vulnerabilities
Source: SECUNIA
Type: Patch, Vendor Advisory
27648
Source: SECUNIA
Type: UNKNOWN
27659
Source: SECUNIA
Type: UNKNOWN
30040
Source: CCN
Type: SECTRACK ID: 1018934
PHP Buffer Overflows, Filtering Bypass, and Configuration Bypass Bugs May Let Users Gain Elevated Privileges
Source: SECTRACK
Type: UNKNOWN
1018934
Source: CCN
Type: ASA-2008-198
HP-UX running Apache with PHP Remote Denial of Service (DoS) Gain Extended Privileges (HPSBUX02332)
Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/wiki/Advisories:rPSA-2007-0242
Source: CCN
Type: PHP Web site
PHP: Hypertext Preprocessor
Source: CONFIRM
Type: UNKNOWN
http://www.php.net/ChangeLog-5.php#5.2.5
Source: CONFIRM
Type: UNKNOWN
http://www.php.net/releases/5_2_5.php
Source: HP
Type: UNKNOWN
SSRT080056
Source: CCN
Type: BID-26403
PHP 5.2.4 and Prior Versions Multiple Vulnerabilities
Source: CCN
Type: USN-720-1
PHP vulnerabilities
Source: XF
Type: UNKNOWN
php-iniset-security-bypass(38590)
Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-1943
Vulnerable Configuration:
Configuration 1
:
cpe:/a:php:php:*:*:*:*:*:*:*:*
(Version <= 5.2.4)
Configuration CCN 1
:
cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.6:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*
OR
cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*
OR
cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
OR
cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*
AND
cpe:/o:hp:hp-ux:b.11.11:*:*:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:b.11.23:*:*:*:*:*:*:*
OR
cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
OR
cpe:/o:hp:hp-ux:b.11.31:*:*:*:*:*:*:*
OR
cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
OR
cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
Denotes that component is vulnerable
Oval Definitions
Definition ID
Class
Title
Last Modified
oval:org.mitre.oval:def:13729
P
USN-720-1 -- php5 vulnerabilities
2014-06-30
BACK
php
php *
php
php 5.0.3
php
php 5.0.4
php
php 5.0.0
php
php 5.0.5
php
php 5.1.1
php
php 5.1.2
php
php 5.1.4
php
php 5.0.2
php
php 5.1.6
php
php 5.2.0
php
php 5.2.1
php
php 5.2.3
php
php 5.0.0 beta1
php
php 5.0.0 beta2
php
php 5.0.0 beta3
php
php 5.0.0 beta4
php
php 5.0.0 rc1
php
php 5.0.0 rc2
php
php 5.0.0 rc3
php
php 5.0.1
php
php 5.1.0
php
php 5.1.3
php
php 5.1.5
php
php 5.2.2
php
php 5.2.4
hp
hp-ux b.11.11
hp
hp-ux b.11.23
canonical
ubuntu 6.06
hp
hp-ux b.11.31
canonical
ubuntu 7.10
canonical
ubuntu 8.04