Show plain JSON{"id": "CVE-2010-1129", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 7.5, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 6.4, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2010-03-26T20:30:00.907", "references": [{"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083", "source": "cve@mitre.org"}, {"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083", "source": "cve@mitre.org"}, {"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/38708", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/40551", "source": "cve@mitre.org"}, {"url": "http://securitytracker.com/id?1023661", "source": "cve@mitre.org"}, {"url": "http://support.apple.com/kb/HT4312", "source": "cve@mitre.org"}, {"url": "http://www.php.net/ChangeLog-5.php", "source": "cve@mitre.org"}, {"url": "http://www.php.net/releases/5_2_13.php", "tags": ["Patch"], "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/38431", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2010/0479", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2010/1796", "source": "cve@mitre.org"}, {"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=emr_na-c02286083", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://lists.apple.com/archives/security-announce/2010//Aug/msg00003.html", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/38708", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/40551", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securitytracker.com/id?1023661", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://support.apple.com/kb/HT4312", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.php.net/ChangeLog-5.php", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.php.net/releases/5_2_13.php", "tags": ["Patch"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/38431", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2010/0479", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2010/1796", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "The safe_mode implementation in PHP before 5.2.13 does not properly handle directory pathnames that lack a trailing / (slash) character, which allows context-dependent attackers to bypass intended access restrictions via vectors related to use of the tempnam function."}, {"lang": "es", "value": "La implementaci\u00f3n de safe_mode en PHP anteriores a v5.2.13 no manejan de forma adecuada las rutas de los nombres de directorios que no tienen un car\u00e1cter \"/\" (barra), lo que permite a usuarios dependiendo del contexto saltarse las restricciones de intentos de acceso a trav\u00e9s de vectores relativos al uso de la funci\u00f3n tempsam."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CD02D837-FD28-4E0F-93F8-25E8D1C84A99"}, {"criteria": "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "88358D1E-BE6F-4CE3-A522-83D1FA4739E3"}, {"criteria": "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D8B97B03-7DA7-4A5F-89B4-E78CAB20DE17"}, {"criteria": "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86767200-6C9C-4C3E-B111-0E5BE61E197B"}, {"criteria": "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B00B416D-FF23-4C76-8751-26D305F0FA0F"}, {"criteria": "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CCB6CDDD-70D3-4004-BCE0-8C4723076103"}, {"criteria": "cpe:2.3:a:php:php:5.2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A782CA26-9C38-40A8-92AE-D47B14D2FCE3"}, {"criteria": "cpe:2.3:a:php:php:5.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1C0E7E2A-4770-4B68-B74C-5F5A6E1876DC"}, {"criteria": "cpe:2.3:a:php:php:5.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0892C89E-9389-4452-B7E0-981A763CD426"}, {"criteria": "cpe:2.3:a:php:php:5.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "635F3CB1-B042-43CC-91AB-746098018D8C"}, {"criteria": "cpe:2.3:a:php:php:5.2.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1F32DDF-17A3-45B5-9227-833EBEBD3923"}, {"criteria": "cpe:2.3:a:php:php:5.2.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CDFB7E9-8510-430F-BFBC-FD811D60DC78"}, {"criteria": "cpe:2.3:a:php:php:5.2.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79D5336A-14AA-483E-9CBE-A7B53120B925"}], "operator": "OR"}]}], "vendorComments": [{"comment": "We do not consider safe_mode / open_basedir restriction bypass issues being security sensitive. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php", "lastModified": "2010-03-27T00:00:00", "organization": "Red Hat"}], "sourceIdentifier": "cve@mitre.org"}