The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T06:45:50.944Z
Reserved: 2009-11-20T00:00:00
Link: CVE-2009-4018

No data.

Status : Modified
Published: 2009-11-29T13:07:32.017
Modified: 2024-11-21T01:08:44.997
Link: CVE-2009-4018
