Show plain JSON{"id": "CVE-2008-7002", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.2, "accessVector": "LOCAL", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 3.9, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2009-08-19T05:24:52.907", "references": [{"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/31064.php", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/31064", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://downloads.securityfocus.com/vulnerabilities/exploits/31064.php", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/31064", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-264"}]}], "descriptions": [{"lang": "en", "value": "PHP 5.2.5 does not enforce (a) open_basedir and (b) safe_mode_exec_dir restrictions for certain functions, which might allow local users to bypass intended access restrictions and call programs outside of the intended directory via the (1) exec, (2) system, (3) shell_exec, (4) passthru, or (5) popen functions, possibly involving pathnames such as \"C:\" drive notation."}, {"lang": "es", "value": "PHP v.5.2.5 no respeta las restricciones de ciertas funciones(a) open_basedir y(b) safe_mode_exec_dir, que pueden permitir a usuarios locales saltarse las restricciones de acceso previstas y las llamadas a programas externas del directorio previsto a trav\u00e9s de las funciones (1) exec, (2) system, (3) shell_exec, (4) passthru, o(5) popen , probablemente relacionados con nombres de ruta como \"C:\" notaci\u00f3n unidad."}], "lastModified": "2025-04-09T00:30:58.490", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCB6CDDD-70D3-4004-BCE0-8C4723076103"}], "operator": "OR"}]}], "vendorComments": [{"comment": "This is not a security issue. For further details, see: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2008-7002#c7", "lastModified": "2009-09-02T00:00:00", "organization": "Red Hat"}], "sourceIdentifier": "cve@mitre.org"}