|
Bugzilla – Full Text Bug Listing |
| Summary: | VUL-0: CVE-2004-1392: php4 open_basedir bypass | ||
|---|---|---|---|
| Product: | [Novell Products] SUSE Security Incidents | Reporter: | Ludwig Nussel <lnussel> |
| Component: | Incidents | Assignee: | Tomas Crhak <tcrhak> |
| Status: | RESOLVED WONTFIX | QA Contact: | Security Team bot <security-team> |
| Severity: | Normal | ||
| Priority: | P3 - Medium | CC: | security-team |
| Version: | unspecified | ||
| Target Milestone: | --- | ||
| Hardware: | All | ||
| OS: | Linux | ||
| Whiteboard: | CVE-2004-1392: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N) | ||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
|
Description
Ludwig Nussel
2004-11-04 00:59:45 UTC
hello? open_basedir is meant to restrict access to a specific directory.
The recommendation from php developpers:
you need to configure/install curl not to allow access to the local
filesystem. It has a nice configure option for that when you are
installing it.
IMHO this would be a nasty restrict for the curl library.
Note that the open_basedir mechanism cannot restrict all access to
open_basedir, like in passthru('cat /etc/parla').
So this open_basedir is a useless feature anyways. I'll close as WONTFIX. CAN-2004-1392 CVE-2004-1392: CVSS v2 Base Score: 5.0 (AV:N/AC:L/Au:N/C:P/I:N/A:N) |