PT-2013-12: open_basedir bypass in PHP

Vulnerable software

PHP
Version: 5.4.12/5.3.22 and earlier

Application link:
http://php.net/

Severity level

Severity level: High
Impact: open_basedir bypass
Access Vector: Remote

CVSS v2:
Base Score: 7.5
Vector: (AV:N/AC:L/Au:N/C:P/I:P/A:P)

CVE: CVE-2013-1635

Software description

PHP is a widely-used general-purpose scripting language that is especially suited for Web development and can be embedded into HTML.

Vulnerability description

The specialists of Positive Technologies have detected bypass of the configuration directive "open_basedir" in PHP.

The vulnerability was detected in the PHP's built-in SoapClient class. PHP does not validate the configration directive "soap.wsdl_cache_dir" before writing SOAP wsdl cache files to the filesystem. Thus an attacker is able to write remote wsdl files to arbitrary locations.

How to fix

Update your software up to the latest version.

Advisory status

07.02.2013 - Vendor gets vulnerability details
14.03.2013 - Vendor releases fixed version and details
19.03.2013 - Public disclosure

Credits

The vulnerability was discovered by Arseniy Reutov, Positive Research Center (Positive Technologies Company)

References

http://en.securitylab.ru/lab/PT-2013-12

Reports on the vulnerabilities previously discovered by Positive Research:

http://ptsecurity.com/research/advisory/
http://en.securitylab.ru/lab/

Threatscape
Visionary WAF – Constant innovation