{ "schema_version": "1.4.0", "id": "GHSA-84wj-6mhh-jgr7", "modified": "2022-05-14T02:39:43Z", "published": "2022-05-14T02:39:43Z", "aliases": [ "CVE-2008-5624" ], "details": "PHP 5 before 5.2.7 does not properly initialize the page_uid and page_gid global variables for use by the SAPI php_getuid function, which allows context-dependent attackers to bypass safe_mode restrictions via variable settings that are intended to be restricted to root, as demonstrated by a setting of /etc for the error_log variable.", "severity": [], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2008-5624" }, { "type": "WEB", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47318" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=124654546101607&w=2" }, { "type": "WEB", "url": "http://marc.info/?l=bugtraq&m=125631037611762&w=2" }, { "type": "WEB", "url": "http://osvdb.org/50483" }, { "type": "WEB", "url": "http://osvdb.org/52207" }, { "type": "WEB", "url": "http://secunia.com/advisories/35003" }, { "type": "WEB", "url": "http://secunia.com/advisories/35650" }, { "type": "WEB", "url": "http://securityreason.com/achievement_securityalert/59" }, { "type": "WEB", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0035" }, { "type": "WEB", "url": "http://www.debian.org/security/2009/dsa-1789" }, { "type": "WEB", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:045" }, { "type": "WEB", "url": "http://www.php.net/ChangeLog-5.php#5.2.7" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/498985/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/archive/1/501376/100/0/threaded" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/32688" } ], "database_specific": { "cwe_ids": [], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2008-12-17T17:30:00Z" } }