Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU32704
Risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID: CVE-2013-1635
CWE-ID:
CWE-264 - Permissions, Privileges, and Access Controls
Exploit availability: No
DescriptionThe vulnerability allows a remote non-authenticated attacker to read and manipulate data.
ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.
MitigationInstall update from vendor's website.
Vulnerable software versionsPHP: 5.3.0 - 5.3.21
CPE2.3 External linkshttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702221
https://git.php.net/?p=php-src.git;a=blob;f=NEWS;h=36f6f9a4396d3034cc903a4271e7fdeccc5d3ea6;hb=refs/heads/PHP-5.4
https://git.php.net/?p=php-src.git;a=blob;f=NEWS;h=82afa3a040e639f3595121e45b850d5453906a00;hb=refs/heads/PHP-5.3
https://git.php.net/?p=php-src.git;a=commitdiff;h=702b436ef470cc02f8e2cc21f2fadeee42103c74
https://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00034.html
https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html
https://support.apple.com/kb/HT5880
https://www.debian.org/security/2013/dsa-2639
https://www.mandriva.com/security/advisories?name=MDVSA-2013:114
https://bugs.gentoo.org/show_bug.cgi?id=459904
https://bugzilla.redhat.com/show_bug.cgi?id=918196
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0101
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.