Executive Summary

Informations
Name CVE-2007-1835 First vendor Publication 2007-04-02
Vendor Cve Last vendor Modification 2018-10-30

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:L/Au:N/C:P/I:P/A:P)
Cvss Base Score 4.6 Attack Range Local
Cvss Impact Score 6.4 Attack Complexity Low
Cvss Expoit Score 3.9 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

PHP 4 before 4.4.5 and PHP 5 before 5.2.1, when using an empty session save path (session.save_path), uses the TMPDIR default after checking the restrictions, which allows local users to bypass open_basedir restrictions.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-1835

CPE : Common Platform Enumeration

TypeDescriptionCount
Application 73

OpenVAS Exploits

Date Description
2012-06-21 Name : PHP version smaller than 4.4.5
File : nvt/nopsec_php_4_4_5.nasl
2012-06-21 Name : PHP version smaller than 5.2.1
File : nvt/nopsec_php_5_2_1.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
33953 PHP session.save_path open_basedir Restriction Bypass

PHP contains a flaw that may allow an attacker to bypass security restrictions. The issue is due to an empty session save path (session.save_path) using the TMPDIR default after checking security restrictions. This may allow a local uesr to bypass the open_basedir security restriction.

Nessus® Vulnerability Scanner

Date Description
2007-04-02 Name : The remote web server uses a version of PHP that is affected by multiple flaws.
File : php_4_4_5.nasl - Type : ACT_GATHER_INFO
2007-04-02 Name : The remote web server uses a version of PHP that is affected by multiple flaws.
File : php_5_2_1.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BID http://www.securityfocus.com/bid/23183
HP http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=...
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=...
MISC http://www.php-security.org/MOPB/MOPB-36-2007.html
SECUNIA http://secunia.com/advisories/25423
http://secunia.com/advisories/25850
VUPEN http://www.vupen.com/english/advisories/2007/1991
http://www.vupen.com/english/advisories/2007/2374
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/33550

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
Date Informations
2024-02-02 01:06:16
  • Multiple Updates
2024-02-01 12:02:15
  • Multiple Updates
2023-09-05 12:05:51
  • Multiple Updates
2023-09-05 01:02:06
  • Multiple Updates
2023-09-02 12:05:56
  • Multiple Updates
2023-09-02 01:02:06
  • Multiple Updates
2023-08-12 12:06:56
  • Multiple Updates
2023-08-12 01:02:07
  • Multiple Updates
2023-08-11 12:06:00
  • Multiple Updates
2023-08-11 01:02:10
  • Multiple Updates
2023-08-06 12:05:42
  • Multiple Updates
2023-08-06 01:02:07
  • Multiple Updates
2023-08-04 12:05:48
  • Multiple Updates
2023-08-04 01:02:10
  • Multiple Updates
2023-07-14 12:05:47
  • Multiple Updates
2023-07-14 01:02:08
  • Multiple Updates
2023-03-29 01:06:26
  • Multiple Updates
2023-03-28 12:02:13
  • Multiple Updates
2022-10-11 12:05:07
  • Multiple Updates
2022-10-11 01:01:58
  • Multiple Updates
2021-05-04 12:05:35
  • Multiple Updates
2021-04-22 01:06:10
  • Multiple Updates
2020-05-23 00:19:32
  • Multiple Updates
2019-06-08 12:02:03
  • Multiple Updates
2019-03-19 12:02:24
  • Multiple Updates
2018-10-31 00:19:48
  • Multiple Updates
2017-07-29 12:02:08
  • Multiple Updates
2016-06-28 16:20:57
  • Multiple Updates
2016-04-26 15:57:09
  • Multiple Updates
2014-02-17 10:39:42
  • Multiple Updates
2013-05-11 10:22:06
  • Multiple Updates