ID: 30609 Updated by: [EMAIL PROTECTED] Reported By: guillaume dot maes at celeonet dot fr -Status: Open +Status: Bogus Bug Type: cURL related Operating System: Linux PHP Version: 4.3.9 New Comment:
Please do not submit the same bug more than once. An existing bug report already describes this very problem. Even if you feel that your issue is somewhat different, the resolution is likely to be the same. Thank you for your interest in PHP. . Previous Comments: ------------------------------------------------------------------------ [2004-10-29 10:21:17] guillaume dot maes at celeonet dot fr Description: ------------ PHP cURL functions bypass open_basedir protection, so users can navigate through filesystem. For example, setting "open_basedir" in php.ini to "/var/www/html" anybody can retrieve "/etc/parla" using cURL functions This vulnerability has been discovered wednesday :http://www.securitytrap.com/mail/bugtraq/2004/Oct/0287.html Reproduce code: --------------- <?php $ch = curl_init("file:///etc/parla"); $file=curl_exec($ch); echo $file ?> Expected result: ---------------- The execution of the file /etc/parla is not allowed because the value of openbase_dir restriction is /var/www/html. Actual result: -------------- The file /etc/parla is executed. If /etc/parla contents : <body><html> Test of vulnerability </html></body> The execution of this code with cURL functions showns the message. ------------------------------------------------------------------------ -- Edit this bug report at http://bugs.php.net/?id=30609&edit=1