Vulnerability Name:

CVE-2008-2051 (CCN-42138)

Assigned:2008-05-01
Published:2008-05-01
Updated:2018-10-11
Summary:The escapeshellcmd API function in PHP before 5.2.6 has unknown impact and context-dependent attack vectors related to "incomplete multibyte chars."
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Bypass Security
References:Source: CCN
Type: BugTraq Mailing List, Tue May 06 2008 - 03:18:25 CDT
Advisory SE-2008-03: PHP Multibyte Shell Command Escaping Bypass Vulnerability

Source: MITRE
Type: CNA
CVE-2008-2051

Source: APPLE
Type: UNKNOWN
APPLE-SA-2008-07-31

Source: SUSE
Type: UNKNOWN
SUSE-SR:2008:014

Source: CCN
Type: RHSA-2008-0505
Moderate: Red Hat Application Stack v2.1 security and enhancement update

Source: CCN
Type: RHSA-2008-0544
Moderate: php security update

Source: CCN
Type: RHSA-2008-0545
Moderate: php security and bug fix update

Source: CCN
Type: RHSA-2008-0546
Moderate: php security update

Source: CCN
Type: RHSA-2008-0582
Moderate: php security update

Source: CCN
Type: SA30048
PHP Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
30048

Source: SECUNIA
Type: UNKNOWN
30083

Source: SECUNIA
Type: UNKNOWN
30158

Source: SECUNIA
Type: UNKNOWN
30288

Source: SECUNIA
Type: UNKNOWN
30345

Source: SECUNIA
Type: UNKNOWN
30411

Source: SECUNIA
Type: UNKNOWN
30757

Source: SECUNIA
Type: UNKNOWN
30828

Source: SECUNIA
Type: UNKNOWN
30967

Source: SECUNIA
Type: UNKNOWN
31119

Source: SECUNIA
Type: UNKNOWN
31124

Source: SECUNIA
Type: UNKNOWN
31200

Source: CCN
Type: SA31326
Apple Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: UNKNOWN
31326

Source: SECUNIA
Type: UNKNOWN
32746

Source: GENTOO
Type: UNKNOWN
GLSA-200811-05

Source: CCN
Type: Apple Web site
About Security Update 2008-005

Source: CCN
Type: ASA-2008-313
php security update (RHSA-2008-0544)

Source: CCN
Type: ASA-2008-320
php security and bug fix update (RHSA-2008-0545)

Source: CCN
Type: ASA-2008-325
php security update (RHSA-2008-0546)

Source: CCN
Type: ASA-2008-326
php security update (RHSA-2008-0582)

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0176

Source: CONFIRM
Type: UNKNOWN
http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178

Source: DEBIAN
Type: UNKNOWN
DSA-1572

Source: DEBIAN
Type: UNKNOWN
DSA-1578

Source: DEBIAN
Type: DSA-1572
php5 -- several vulnerabilities

Source: DEBIAN
Type: DSA-1578
php4 -- several vulnerabilities

Source: CCN
Type: GLSA-200811-05
PHP: Multiple vulnerabilities

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:125

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:126

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:127

Source: MANDRIVA
Type: UNKNOWN
MDVSA-2008:128

Source: MLIST
Type: UNKNOWN
[oss-security] 20080502 CVE Request (PHP)

Source: CCN
Type: PHP5 ChangeLog
Version 5.2.6

Source: CONFIRM
Type: UNKNOWN
http://www.php.net/ChangeLog-5.php

Source: CCN
Type: PHP Web site
PHP: Downloads

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0505

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0544

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0545

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0546

Source: REDHAT
Type: UNKNOWN
RHSA-2008:0582

Source: BUGTRAQ
Type: UNKNOWN
20080523 rPSA-2008-0176-1 php php-cgi php-imap php-mcrypt php-mysql php-mysqli php-pgsql php-soap php-xsl php5 php5-cgi php5-imap php5-mcrypt php5-mysql php5-mysqli php5-pear php5-pgsql php5-soap php5-xsl

Source: BUGTRAQ
Type: UNKNOWN
20080527 rPSA-2008-0178-1 php php-mysql php-pgsql

Source: BID
Type: UNKNOWN
29009

Source: CCN
Type: BID-29009
PHP 5.2.5 and Prior Versions Multiple Vulnerabilities

Source: SLACKWARE
Type: UNKNOWN
SSA:2008-128-01

Source: CCN
Type: TLSA-2008-27
Multiple vulnerabilities exist in php

Source: CCN
Type: TLSA-2009-2
Multiple vulnerabilities exist in php

Source: CCN
Type: USN-628-1
PHP vulnerabilities

Source: UBUNTU
Type: UNKNOWN
USN-628-1

Source: VUPEN
Type: UNKNOWN
ADV-2008-1412

Source: VUPEN
Type: UNKNOWN
ADV-2008-2268

Source: XF
Type: UNKNOWN
php-escapeshellcmd-security-bypass(42138)

Source: CONFIRM
Type: UNKNOWN
https://issues.rpath.com/browse/RPL-2503

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:10256

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-3864

Source: FEDORA
Type: UNKNOWN
FEDORA-2008-3606

Source: SUSE
Type: SUSE-SR:2008:014
[security-announce] SUSE Security Summary Report SUSE-SR:2008:014

Vulnerable Configuration:Configuration 1:
  • cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:*:*:*:*:*:*:*:* (Version <= 5.2.5)

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:*

  • Configuration RedHat 5:
  • cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*

  • Configuration RedHat 6:
  • cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*

  • Configuration RedHat 7:
  • cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*

  • Configuration RedHat 8:
  • cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:php:php:5.0.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.3:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:beta4:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc1:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc2:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.0:rc3:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.0.1:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.0:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.1.5:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.2:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.4:-:*:*:*:*:*:*
  • OR cpe:/a:php:php:5.2.5:-:*:*:*:*:*:*
  • AND
  • cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:6.06::lts:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:4.0::x86_64:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:fuji:*:*:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:*
  • OR cpe:/o:turbolinux:turbolinux:*:*:multimedia:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0::x86-64:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.04:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:7.10:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:x86_64:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2007.1::x86-64:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_application_stack:2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:4.6.z:ga:es:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:2008.1:*:*:*:*:*:*:*
  • OR cpe:/o:canonical:ubuntu:8.04::lts:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x:10.5.4:*:*:*:*:*:*:*
  • OR cpe:/o:apple:mac_os_x_server:10.5.4:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20082051
    V
    CVE-2008-2051
    2022-09-02
    oval:org.mitre.oval:def:29150
    P
    RHSA-2008:0544 -- php security update (Moderate)
    2015-08-17
    oval:org.mitre.oval:def:8065
    P
    DSA-1578 php4 -- several vulnerabilities
    2015-02-23
    oval:org.mitre.oval:def:17737
    P
    USN-628-1 -- php5 vulnerabilities
    2014-06-30
    oval:org.mitre.oval:def:7889
    P
    DSA-1572 php5 -- several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:18224
    P
    DSA-1578-1 php4 - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:18599
    P
    DSA-1572-1 php5 - several vulnerabilities
    2014-06-23
    oval:org.mitre.oval:def:22394
    P
    ELSA-2008:0544: php security update (Moderate)
    2014-05-26
    oval:org.mitre.oval:def:10256
    V
    The escapeshellcmd API function in PHP before 5.2.6 has unknown impact and context-dependent attack vectors related to "incomplete multibyte chars."
    2013-04-29
    oval:com.redhat.rhsa:def:20080544
    P
    RHSA-2008:0544: php security update (Moderate)
    2008-07-16
    oval:com.redhat.rhsa:def:20080545
    P
    RHSA-2008:0545: php security and bug fix update (Moderate)
    2008-07-16
    oval:org.debian:def:1578
    V
    several vulnerabilities
    2008-05-17
    oval:org.debian:def:1572
    V
    several vulnerabilities
    2008-05-11
    BACK
    php php 5.0.0 beta1
    php php 5.0.0 beta2
    php php 5.0.0 beta3
    php php 5.0.0 beta4
    php php 5.0.0 rc1
    php php 5.0.0 rc2
    php php 5.0.0 rc3
    php php 5.0.1
    php php 5.0.2
    php php 5.0.3
    php php 5.0.4
    php php 5.0.5
    php php 5.1.0
    php php 5.1.1
    php php 5.1.2
    php php 5.1.3
    php php 5.1.4
    php php 5.1.5
    php php 5.1.6
    php php 5.2.0
    php php 5.2.1
    php php 5.2.2
    php php 5.2.3
    php php 5.2.4
    php php *
    php php 5.0.3
    php php 5.0.4
    php php 5.0.5
    php php 5.1.1
    php php 5.1.2
    php php 5.1.4
    php php 5.0.2
    php php 5.1.6
    php php 5.2.0
    php php 5.2.1
    php php 5.2.3
    php php 5.0.0 beta1
    php php 5.0.0 beta2
    php php 5.0.0 beta3
    php php 5.0.0 beta4
    php php 5.0.0 rc1
    php php 5.0.0 rc2
    php php 5.0.0 rc3
    php php 5.0.1
    php php 5.1.0
    php php 5.1.3
    php php 5.1.5
    php php 5.2.2
    php php 5.2.4
    php php 5.2.5
    gentoo linux *
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 3
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat enterprise linux 4
    redhat linux advanced workstation 2.1
    canonical ubuntu 6.06
    mandrakesoft mandrake linux corporate server 4.0
    mandrakesoft mandrake linux corporate server 4.0
    turbolinux turbolinux fuji
    turbolinux turbolinux personal *
    turbolinux turbolinux multimedia *
    redhat enterprise linux 5
    redhat enterprise linux 5
    mandrakesoft mandrake linux 2007.1
    mandrakesoft mandrake linux 2008.0
    debian debian linux 4.0
    canonical ubuntu 7.04
    canonical ubuntu 7.10
    mandrakesoft mandrake linux 2008.0
    mandrakesoft mandrake linux 2008.1 x86_64
    mandrakesoft mandrake linux 2007.1
    redhat rhel application stack 2
    redhat enterprise linux 4.6.z ga
    redhat enterprise linux 4.6.z ga
    mandrakesoft mandrake linux 2008.1
    canonical ubuntu 8.04
    apple mac os x 10.5.4
    apple mac os x server 10.5.4