CVE-2006-4483

The cURL extension files (1) ext/curl/interface.c and (2) ext/curl/streams.c in PHP before 5.1.5 permit the CURLOPT_FOLLOWLOCATION option when open_basedir or safe_mode is enabled, which allows attackers to perform unauthorized actions, possibly related to the realpath cache.
Configurations

Configuration 1 (hide)

cpe:2.3:a:php:php:*:*:*:*:*:*:*:*

History

19 Jul 2022, 18:34

Type Values Removed Values Added
CWE NVD-CWE-Other CWE-862
CPE cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
References (SECUNIA) http://secunia.com/advisories/30411 - (SECUNIA) http://secunia.com/advisories/30411 - Not Applicable
References (SECUNIA) http://secunia.com/advisories/22039 - (SECUNIA) http://secunia.com/advisories/22039 - Not Applicable
References (CONFIRM) http://www.php.net/ChangeLog-5.php#5.1.5 - (CONFIRM) http://www.php.net/ChangeLog-5.php#5.1.5 - Release Notes, Vendor Advisory
References (CONFIRM) http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?view=log - Patch (CONFIRM) http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?view=log - Broken Link, Patch
References (SECUNIA) http://secunia.com/advisories/21546 - Patch, Vendor Advisory (SECUNIA) http://secunia.com/advisories/21546 - Not Applicable, Patch, Vendor Advisory
References (VUPEN) http://www.vupen.com/english/advisories/2006/3318 - (VUPEN) http://www.vupen.com/english/advisories/2006/3318 - Permissions Required
References (CONFIRM) http://www.php.net/release_5_1_5.php - Patch (CONFIRM) http://www.php.net/release_5_1_5.php - Patch, Release Notes, Vendor Advisory
References (BID) http://www.securityfocus.com/bid/19582 - (BID) http://www.securityfocus.com/bid/19582 - Third Party Advisory, VDB Entry
References (SECTRACK) http://securitytracker.com/id?1016984 - (SECTRACK) http://securitytracker.com/id?1016984 - Broken Link, Third Party Advisory, VDB Entry
References (SUSE) http://www.novell.com/linux/security/advisories/2006_52_php.html - (SUSE) http://www.novell.com/linux/security/advisories/2006_52_php.html - Broken Link
References (CONFIRM) http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178 - (CONFIRM) http://wiki.rpath.com/wiki/Advisories:rPSA-2008-0178 - Broken Link
References (MISC) http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?r1=1.62.2.14.2.6&r2=1.62.2.14.2.7 - Patch (MISC) http://cvs.php.net/viewcvs.cgi/php-src/ext/curl/interface.c?r1=1.62.2.14.2.6&r2=1.62.2.14.2.7 - Broken Link, Patch
References (MISC) http://cvs.php.net/viewvc.cgi/php-src/ext/curl/streams.c?r1=1.14.2.2.2.3&r2=1.14.2.2.2.4 - Patch (MISC) http://cvs.php.net/viewvc.cgi/php-src/ext/curl/streams.c?r1=1.14.2.2.2.3&r2=1.14.2.2.2.4 - Broken Link, Patch
References (BUGTRAQ) http://www.securityfocus.com/archive/1/492671/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/492671/100/0/threaded - Third Party Advisory, VDB Entry

Information

Published : 2006-08-31 21:04

Updated : 2023-12-10 10:28


NVD link : CVE-2006-4483

Mitre link : CVE-2006-4483

CVE.ORG link : CVE-2006-4483


JSON object : View

Products Affected

php

  • php
CWE
CWE-862

Missing Authorization