Show plain JSON{"id": "CVE-2008-5624", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2008-12-17T17:30:00.453", "references": [{"url": "http://marc.info/?l=bugtraq&m=124654546101607&w=2", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=124654546101607&w=2", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=125631037611762&w=2", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=125631037611762&w=2", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/50483", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/52207", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/35003", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/35650", "source": "cve@mitre.org"}, {"url": "http://securityreason.com/achievement_securityalert/59", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0035", "source": "cve@mitre.org"}, {"url": "http://www.debian.org/security/2009/dsa-1789", "source": "cve@mitre.org"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:045", "source": "cve@mitre.org"}, {"url": "http://www.php.net/ChangeLog-5.php#5.2.7", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/498985/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/501376/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/32688", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47318", "source": "cve@mitre.org"}, {"url": "http://marc.info/?l=bugtraq&m=124654546101607&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=bugtraq&m=124654546101607&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=bugtraq&m=125631037611762&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://marc.info/?l=bugtraq&m=125631037611762&w=2", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/50483", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://osvdb.org/52207", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/35003", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/35650", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/achievement_securityalert/59", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://wiki.rpath.com/Advisories:rPSA-2009-0035", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.debian.org/security/2009/dsa-1789", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:045", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.php.net/ChangeLog-5.php#5.2.7", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/498985/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/501376/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/32688", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47318", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable."}, {"lang": "es", "value": "PHP 5 en versiones anteriores a 5.2.7, no inicializa propiamente las variable page_uid y page_gid global para ser usadas por la funci\u00f3n SAPI php_getuid, el cual permite a los atacante dependientes de contexto evitar la restricciones safe_mode a trav\u00e9s de par\u00e1metros variables que pretende ser restringida para el directorio ra\u00edz, como demuestra por un par\u00e1metro de /etc para la variable error_log."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7007E77F-60EF-44D8-9676-15B59DF1325F"}, {"criteria": "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E727CECE-E452-489A-A42F-5A069D6AF80E"}, {"criteria": "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "149A1FB8-593E-412B-8E1C-3E560301D500"}, {"criteria": "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D6E8982-D7AE-4A52-8F7C-A4D59D2A2CA4"}, {"criteria": "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8FC144FA-8F84-44C0-B263-B639FEAD20FB"}, {"criteria": "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "295907B4-C3DE-4021-BE3B-A8826D4379E6"}, {"criteria": "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBC98F82-6E1D-4A89-8ED4-ECD9BD954EB4"}, {"criteria": "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B881352D-954E-4FC0-9E42-93D02A3F3089"}, {"criteria": "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B"}, {"criteria": "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "74E7AE59-1CB0-4300-BBE0-109F909789EF"}, {"criteria": "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9222821E-370F-4616-B787-CC22C2F4E7CD"}, {"criteria": "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9809449F-9A76-4318-B233-B4C2950A6EA9"}, {"criteria": "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0AA962D4-A4EC-4DC3-B8A9-D10941B92781"}, {"criteria": "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F8CDFEF9-C367-4800-8A2F-375C261FAE55"}, {"criteria": "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16E43B88-1563-4EFD-9267-AE3E8C35D67A"}, {"criteria": "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "11E5715F-A8BC-49EF-836B-BB78E1BC0790"}, {"criteria": "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5FA68843-158E-463E-B68A-1ACF041C4E10"}, {"criteria": "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1874F637-77E2-4C4A-BF92-AEE96A60BFB0"}, {"criteria": "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9592B32E-55CD-42D0-901E-8319823BC820"}, {"criteria": "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9BF34B5-F74C-4D56-9841-42452D60CB87"}, {"criteria": "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD02D837-FD28-4E0F-93F8-25E8D1C84A99"}, {"criteria": "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88358D1E-BE6F-4CE3-A522-83D1FA4739E3"}, {"criteria": "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8B97B03-7DA7-4A5F-89B4-E78CAB20DE17"}, {"criteria": "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86767200-6C9C-4C3E-B111-0E5BE61E197B"}, {"criteria": "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B00B416D-FF23-4C76-8751-26D305F0FA0F"}, {"criteria": "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCB6CDDD-70D3-4004-BCE0-8C4723076103"}, {"criteria": "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A782CA26-9C38-40A8-92AE-D47B14D2FCE3"}, {"criteria": "cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C0E7E2A-4770-4B68-B74C-5F5A6E1876DC"}], "operator": "OR"}]}], "vendorComments": [{"comment": "We do not consider these to be security issues. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php", "lastModified": "2009-03-17T00:00:00", "organization": "Red Hat"}], "sourceIdentifier": "cve@mitre.org"}