PHP MySQL client library allows an attacker to bypass safe_mode restrictions
|php-mysql-safemode-bypass (8105)||Low Risk|
The MySQL client library distributed with PHP could allow a remote attacker to bypass safe_mode filesystem restrictions. A remote attacker could use the "LOAD DATA INFILE LOCAL" statements to bypass the filesystem restrictions and view unauthorized files on the filesystem.
No remedy available as of September 4, 2010.
- BugTraq Mailing List, Sun Feb 03 2002 - 16:21:44 CST: PHP Safe Mode Filesystem Circumvention Problem.
- BID-4026: PHP MySQL Safe_Mode Filesystem Circumvention Vulnerability
- CVE-2002-0229: Safe Mode feature (safe_mode) in PHP 3.0 through 4.1.0 allows attackers with access to the MySQL database to bypass Safe Mode access restrictions and read arbitrary files using LOAD DATA INFILE LOCAL SQL statements.
- OSVDB ID: 9912: PHP safe_mode MySQL Database Access Restriction Bypass
- PHP PHP 3.0
- PHP PHP 4.0
Feb 03, 2002
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this