{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2006-4625", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "PHP 4.x up to 4.4.4 and PHP 5 up to 5.1.6 allows local users to bypass certain Apache HTTP Server httpd.conf options, such as safe_mode and open_basedir, via the ini_restore function, which resets the values to their php.ini (Master Value) defaults." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "20060909 PHP 5.1.6 / 4.4.4 Critical php_admin* bypass by ini_restore()", "refsource" : "SREASONRES", "url" : "http://securityreason.com/achievement_securityalert/42" }, { "name" : "20060909 Re: PHP 5.1.6 / 4.4.4 Critical php_admin* bypass by ini_restore()", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/archive/1/445712/100/0/threaded" }, { "name" : "20060913 Re: PHP 5.1.6 / 4.4.4 Critical php_admin* bypass by ini_restore()", "refsource" : "BUGTRAQ", "url" : "http://www.securityfocus.com/archive/1/archive/1/445882/100/0/threaded" }, { "name" : "HPSBMA02215", "refsource" : "HP", "url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506" }, { "name" : "SSRT071423", "refsource" : "HP", "url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01056506" }, { "name" : "HPSBTU02232", "refsource" : "HP", "url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137" }, { "name" : "SSRT071429", "refsource" : "HP", "url" : "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c01086137" }, { "name" : "MDKSA-2006:185", "refsource" : "MANDRIVA", "url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2006:185" }, { "name" : "OpenPKG-SA-2006.023", "refsource" : "OPENPKG", "url" : "http://www.securityfocus.com/archive/1/archive/1/448953/100/0/threaded" }, { "name" : "SUSE-SA:2006:059", "refsource" : "SUSE", "url" : "http://lists.suse.com/archive/suse-security-announce/2006-Oct/0002.html" }, { "name" : "TLSA-2006-38", "refsource" : "TURBO", "url" : "http://www.turbolinux.com/security/2006/TLSA-2006-38.txt" }, { "name" : "USN-362-1", "refsource" : "UBUNTU", "url" : "http://www.ubuntu.com/usn/usn-362-1" }, { "name" : "19933", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/19933" }, { "name" : "ADV-2007-1991", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/1991" }, { "name" : "ADV-2007-2374", "refsource" : "VUPEN", "url" : "http://www.vupen.com/english/advisories/2007/2374" }, { "name" : "22282", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/22282" }, { "name" : "22338", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/22338" }, { "name" : "22424", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/22424" }, { "name" : "22331", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/22331" }, { "name" : "25423", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25423" }, { "name" : "25850", "refsource" : "SECUNIA", "url" : "http://secunia.com/advisories/25850" }, { "name" : "1519", "refsource" : "SREASON", "url" : "http://securityreason.com/securityalert/1519" }, { "name" : "php-inirestore-security-bypass(28853)", "refsource" : "XF", "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/28853" } ] } }