CVE-2007-3007

N/A Unknown
Published: June 04, 2007 Modified: April 23, 2026
View on NVD

Description

PHP 5 before 5.2.3 does not enforce the open_basedir or safe_mode restriction in certain cases, which allows context-dependent attackers to determine the existence of arbitrary files by checking if the readfile function returns a string. NOTE: this issue might also involve the realpath function.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://bugs.php.net/bug.php?id=41492
Source: cve@mitre.org
Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
Source: cve@mitre.org
Mailing List Third Party Advisory
http://osvdb.org/36084
Source: cve@mitre.org
Broken Link
http://secunia.com/advisories/25456
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26048
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/26231
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27102
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/27110
Source: cve@mitre.org
Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
Source: cve@mitre.org
Third Party Advisory
http://www.php.net/releases/5_2_3.php
Source: cve@mitre.org
Vendor Advisory
http://www.securityfocus.com/bid/24259
Source: cve@mitre.org
Third Party Advisory VDB Entry
http://www.trustix.org/errata/2007/0023/
Source: cve@mitre.org
Broken Link
http://bugs.php.net/bug.php?id=41492
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://lists.opensuse.org/opensuse-security-announce/2007-07/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://osvdb.org/36084
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/25456
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26048
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/26231
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27102
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/27110
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.gentoo.org/security/en/glsa/glsa-200710-02.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.php.net/releases/5_2_3.php
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/bid/24259
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.trustix.org/errata/2007/0023/
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00397.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

26 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
1.2%
79th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

php