Vulnerabilities > CVE-2007-4889 - Security Bypass vulnerability in PHP
Attack vector
NETWORK Attack complexity
MEDIUM Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
PARTIAL Availability impact
PARTIAL Summary
The MySQL extension in PHP 5.2.4 and earlier allows remote attackers to bypass safe_mode and open_basedir restrictions via the MySQL (1) LOAD_FILE, (2) INTO DUMPFILE, and (3) INTO OUTFILE functions, a different issue than CVE-2007-3997.
Vulnerable Configurations
Nessus
NASL family | CGI abuses |
NASL id | PHP_5_2_5.NASL |
description | According to its banner, the version of PHP installed on the remote host is older than 5.2.5. Such versions may be affected by various issues, including but not limited to several buffer overflows. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 28181 |
published | 2007-11-12 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/28181 |
title | PHP < 5.2.5 Multiple Vulnerabilities |
code |
|
Statements
contributor Vincent Danen lastmodified 2007-09-18 organization Mandriva statement Due to the nature of safe_mode and open_basedir restrictions, and in alignment with the PHP group’s stance on these features, Mandriva does not consider this a security issue. contributor Mark J Cox lastmodified 2007-09-14 organization Red Hat statement We do not consider these to be security issues. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php