PHP 'tempnam()' 'safe_mode' Validation Restriction-Bypass Vulnerability

PHP is prone to a 'safe_mode' restriction-bypass vulnerability. Successful exploits could allow an attacker to access files in unauthorized locations or create files in any writable directory.

This vulnerability would be an issue in shared-hosting configurations where multiple users can create and execute arbitrary PHP script code; the 'safe_mode' restrictions are assumed to isolate users from each other.

PHP 5.2.12 and prior versions are affected.


 

Privacy Statement
Copyright 2010, SecurityFocus