Vulnerability identifier: #VU32704
Vulnerability risk: Medium
CVSSv4.0: 2.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-264
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
PHP
Universal components / Libraries /
Scripting languages
Vendor: PHP Group
Description
The vulnerability allows a remote non-authenticated attacker to read and manipulate data.
ext/soap/soap.c in PHP before 5.3.22 and 5.4.x before 5.4.13 does not validate the relationship between the soap.wsdl_cache_dir directive and the open_basedir directive, which allows remote attackers to bypass intended access restrictions by triggering the creation of cached SOAP WSDL files in an arbitrary directory.
Mitigation
Install update from vendor's website.
Vulnerable software versions
PHP: 5.3.0 - 5.3.21
External links
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=702221
https://git.php.net/?p=php-src.git;a=blob;f=NEWS;h=36f6f9a4396d3034cc903a4271e7fdeccc5d3ea6;hb=refs/heads/PHP-5.4
https://git.php.net/?p=php-src.git;a=blob;f=NEWS;h=82afa3a040e639f3595121e45b850d5453906a00;hb=refs/heads/PHP-5.3
https://git.php.net/?p=php-src.git;a=commitdiff;h=702b436ef470cc02f8e2cc21f2fadeee42103c74
https://lists.apple.com/archives/security-announce/2013/Sep/msg00002.html
https://lists.opensuse.org/opensuse-security-announce/2013-07/msg00034.html
https://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html
https://support.apple.com/kb/HT5880
https://www.debian.org/security/2013/dsa-2639
https://www.mandriva.com/security/advisories?name=MDVSA-2013:114
https://bugs.gentoo.org/show_bug.cgi?id=459904
https://bugzilla.redhat.com/show_bug.cgi?id=918196
https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0101
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.