fkie_cve-2008-5658
Vulnerability from fkie_nvd
Published
2008-12-17 20:30
Modified
2025-04-09 00:30
Severity ?
Summary
Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
php | php | * | |
php | php | 5.0.0 | |
php | php | 5.0.0 | |
php | php | 5.0.0 | |
php | php | 5.0.0 | |
php | php | 5.0.0 | |
php | php | 5.0.0 | |
php | php | 5.0.0 | |
php | php | 5.0.0 | |
php | php | 5.0.1 | |
php | php | 5.0.2 | |
php | php | 5.0.3 | |
php | php | 5.0.4 | |
php | php | 5.0.5 | |
php | php | 5.1.0 | |
php | php | 5.1.1 | |
php | php | 5.1.2 | |
php | php | 5.1.3 | |
php | php | 5.1.4 | |
php | php | 5.1.5 | |
php | php | 5.1.6 | |
php | php | 5.2.0 | |
php | php | 5.2.1 | |
php | php | 5.2.2 | |
php | php | 5.2.3 | |
php | php | 5.2.4 | |
php | php | 5.2.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*", "matchCriteriaId": "9FCD404F-54C5-4DFF-ABC3-F0745C5BC96F", "versionEndIncluding": "5.2.6", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "7007E77F-60EF-44D8-9676-15B59DF1325F", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:beta1:*:*:*:*:*:*", "matchCriteriaId": "E727CECE-E452-489A-A42F-5A069D6AF80E", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:beta2:*:*:*:*:*:*", "matchCriteriaId": "149A1FB8-593E-412B-8E1C-3E560301D500", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:beta3:*:*:*:*:*:*", "matchCriteriaId": "5D6E8982-D7AE-4A52-8F7C-A4D59D2A2CA4", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:beta4:*:*:*:*:*:*", "matchCriteriaId": "8FC144FA-8F84-44C0-B263-B639FEAD20FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:rc1:*:*:*:*:*:*", "matchCriteriaId": "295907B4-C3DE-4021-BE3B-A8826D4379E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:rc2:*:*:*:*:*:*", "matchCriteriaId": "DBC98F82-6E1D-4A89-8ED4-ECD9BD954EB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.0:rc3:*:*:*:*:*:*", "matchCriteriaId": "B881352D-954E-4FC0-9E42-93D02A3F3089", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "17437AED-816A-4CCF-96DE-8C3D0CC8DB2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "74E7AE59-1CB0-4300-BBE0-109F909789EF", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "9222821E-370F-4616-B787-CC22C2F4E7CD", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "9809449F-9A76-4318-B233-B4C2950A6EA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "0AA962D4-A4EC-4DC3-B8A9-D10941B92781", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "F8CDFEF9-C367-4800-8A2F-375C261FAE55", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "16E43B88-1563-4EFD-9267-AE3E8C35D67A", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "11E5715F-A8BC-49EF-836B-BB78E1BC0790", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "5FA68843-158E-463E-B68A-1ACF041C4E10", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "1874F637-77E2-4C4A-BF92-AEE96A60BFB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "9592B32E-55CD-42D0-901E-8319823BC820", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.1.6:*:*:*:*:*:*:*", "matchCriteriaId": "A9BF34B5-F74C-4D56-9841-42452D60CB87", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "CD02D837-FD28-4E0F-93F8-25E8D1C84A99", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "88358D1E-BE6F-4CE3-A522-83D1FA4739E3", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "D8B97B03-7DA7-4A5F-89B4-E78CAB20DE17", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "86767200-6C9C-4C3E-B111-0E5BE61E197B", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "B00B416D-FF23-4C76-8751-26D305F0FA0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:php:php:5.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "CCB6CDDD-70D3-4004-BCE0-8C4723076103", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in the ZipArchive::extractTo function in PHP 5.2.6 and earlier allows context-dependent attackers to write arbitrary files via a ZIP file with a file whose name contains .. (dot dot) sequences." }, { "lang": "es", "value": "Vulnerabilidad de salto de directorio en la funci\u00f3n ZipArchive::extractTo de PHP 5.2.6 y anteriores, permite a atacantes dependientes del contexto escribir ficheros de su elecci\u00f3n a trav\u00e9s de un archivo ZIP con un fichero que contenga la secuencia .. (punto punto)." } ], "id": "CVE-2008-5658", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2008-12-17T20:30:01.017", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2008-12/0039.html" }, { "source": "cve@mitre.org", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=124654546101607\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=124654546101607\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=125631037611762\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=125631037611762\u0026w=2" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/50480" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/35003" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/35306" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/35650" }, { "source": "cve@mitre.org", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0035" }, { "source": "cve@mitre.org", "url": "http://www.debian.org/security/2009/dsa-1789" }, { "source": "cve@mitre.org", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:045" }, { "source": "cve@mitre.org", "url": "http://www.openwall.com/lists/oss-security/2008/12/04/3" }, { "source": "cve@mitre.org", "url": "http://www.php.net/ChangeLog-5.php#5.2.7" }, { "source": "cve@mitre.org", "url": "http://www.redhat.com/support/errata/RHSA-2009-0350.html" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/501376/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/32625" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021303" }, { "source": "cve@mitre.org", "tags": [ "Exploit" ], "url": "http://www.sektioneins.de/advisories/SE-2008-06.txt" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47079" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html" }, { "source": "cve@mitre.org", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2008-12/0039.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=124654546101607\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=124654546101607\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=125631037611762\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=125631037611762\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/50480" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35003" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35306" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/35650" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://wiki.rpath.com/Advisories:rPSA-2009-0035" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2009/dsa-1789" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2009:045" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2008/12/04/3" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.php.net/ChangeLog-5.php#5.2.7" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.redhat.com/support/errata/RHSA-2009-0350.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/501376/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/32625" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit" ], "url": "http://www.sektioneins.de/advisories/SE-2008-06.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/47079" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01451.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01465.html" } ], "sourceIdentifier": "cve@mitre.org", "vendorComments": [ { "comment": "This issue did not affect PHP versions as shipped in Red Hat Enterprise Linux 2.1, 3, 4, and 5, and Red Hat Application Stack v1. PHP version in Red Hat Application Stack v2 was fixed via: https://rhn.redhat.com/errata/RHSA-2009-0350.html", "lastModified": "2009-04-15T00:00:00", "organization": "Red Hat" } ], "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…