ID:               30610
 Updated by:       [EMAIL PROTECTED]
 Reported By:      guillaume dot maes at celeonet dot fr
-Status:           Open
+Status:           Bogus
 Bug Type:         cURL related
 Operating System: Linux
 PHP Version:      4.3.9
 New Comment:

Please do not submit the same bug more than once. An existing
bug report already describes this very problem. Even if you feel
that your issue is somewhat different, the resolution is likely
to be the same. 

Thank you for your interest in PHP.

#30609


Previous Comments:
------------------------------------------------------------------------

[2004-10-29 10:23:16] guillaume dot maes at celeonet dot fr

Description:
------------
PHP cURL functions bypass open_basedir
protection, so users can navigate through
filesystem.

For example, setting "open_basedir" in php.ini to
"/var/www/html" anybody can retrieve "/etc/parla"
using cURL functions

This vulnerability has been discovered wednesday
:http://www.securitytrap.com/mail/bugtraq/2004/Oct/0287.html





Reproduce code:
---------------
<?php
$ch = curl_init("file:///etc/parla");
$file=curl_exec($ch);
echo $file
?> 

Expected result:
----------------
The execution of the file /etc/parla is not allowed because the value
of openbase_dir restriction is /var/www/html.

Actual result:
--------------
The file /etc/parla is executed. 

If /etc/parla contents :

<body><html> Test of vulnerability </html></body>

The execution of this code with cURL functions showns the message.


------------------------------------------------------------------------


-- 
Edit this bug report at http://bugs.php.net/?id=30610&edit=1

Reply via email to