Permissions, Privileges, and Access Controls in PHP



| Updated: 2020-07-28
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2013-1635
CWE-ID CWE-264
Exploitation vector Network
Public exploit N/A
Vulnerable software
PHP
Universal components / Libraries / Scripting languages

Vendor PHP Group

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Permissions, Privileges, and Access Controls

EUVDB-ID: #VU32704

Risk: Medium

CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2013-1635

CWE-ID: CWE-264 - Permissions, Privileges, and Access Controls

Exploit availability: No

Description

The vulnerability allows a remote non-authenticated attacker to read and manipulate data.

ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.

Mitigation

Install update from vendor's website.

Vulnerable software versions

PHP: 5.3.0 - 5.3.21

CPE2.3 External links

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702221
https://git.php.net/?p=php-src.git;a=blob;f=NEWS;h=36f6f9a4396d3034cc903a4271e7fdeccc5d3ea6;hb=refs/heads/PHP-5.4
https://git.php.net/?p=php-src.git;a=blob;f=NEWS;h=82afa3a040e639f3595121e45b850d5453906a00;hb=refs/heads/PHP-5.3
https://git.php.net/?p=php-src.git;a=commitdiff;h=702b436ef470cc02f8e2cc21f2fadeee42103c74
https://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00034.html
https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html
https://support.apple.com/kb/HT5880
https://www.debian.org/security/2013/dsa-2639
https://www.mandriva.com/security/advisories?name=MDVSA-2013:114
https://bugs.gentoo.org/show_bug.cgi?id=459904
https://bugzilla.redhat.com/show_bug.cgi?id=918196
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0101


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###