PT-2013-12: open_basedir bypass in PHP
Vulnerable software
PHP
Version: 5.4.12/5.3.22 and earlier
Application link:
http://php.net/
Severity level
Severity level: High
Impact: open_basedir bypass
Access Vector: Remote
CVSS v2:
Base Score: 7.5
Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)
CVE: CVE-2013-1635
Software description
PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.
Vulnerability description
The specialists of Positive Technologies have detected bypass of the configuration directive "open_basedir" in PHP.
The vulnerability was detected in the PHP's built-in SoapClient class. PHP does not validate the configration directive "soap.wsdl_cache_dir" before writing SOAP wsdl cache files to the filesystem. Thus an attacker is able to write remote wsdl files to arbitrary locations.
How to fix
Update your software up to the latest version.
Advisory status
07.02.2013 - Vendor gets vulnerability details
14.03.2013 - Vendor releases fixed version and details
19.03.2013 - Public disclosure
Credits
The vulnerability was discovered by Arseniy Reutov, Positive Research Center (Positive Technologies Company)
References
http://en.securitylab.ru/lab/PT-2013-12
Reports on the vulnerabilities previously discovered by Positive Research:
http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/