session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-09-16T23:36:19.846Z
Reserved: 2010-03-26T00:00:00Z
Link: CVE-2010-1130

No data.

Status : Modified
Published: 2010-03-26T20:30:00.953
Modified: 2024-11-21T01:13:42.750
Link: CVE-2010-1130
