News Feed
Sections




News Archive
Looking for more information on how to do PHP the right way? Check out PHP: The Right Way

Secunia.com:
PHP "glob()" Code Execution Vulnerability
July 16, 2007 @ 13:52:38

As reported here on Secunia (as discovered by shinnai), there's a code execution vulnerability in PHP's glob function:

The vulnerability is caused due to an error in the handling of an uninitialized structure inside the "glob()" function. This can be exploited to execute arbitrary code, which may lead to security restrictions (e.g. the "disable_functions" directive) being bypassed.

The vulnerability is confirmed in the 5.2.3 win32 installer. Other versions may also be affected.

The issue is marked as "less critical" and can be avoided easily by only allowing trusted users the correct permissions to execute PHP code on the server.

0 comments voice your opinion now!
glob vulnerability execution bypass security glob vulnerability execution bypass security


blog comments powered by Disqus

Similar Posts

Zend Developer Zone: Security Tips #17 & #18 (When to Secure & File Uploads)

PEAR Blog: Net_Traceroute and Net_Ping security advisory

ThinkPHP Blog: Leveraging Security to PHP (using sausages)

Dan Scott's Blog: Serendipity (s9y) blog: Security release

PHP Security Blog: phpBB mass hack in preparation?


Community Events

Don't see your event here?
Let us know!


series development interview wordpress library feature introduction laravel language opinion release laravel5 api threedevsandamaybe community voicesoftheelephpant podcast unittest framework extension

All content copyright, 2015 PHPDeveloper.org :: info@phpdeveloper.org - Powered by the Solar PHP Framework