Vulnerability Details : CVE-2004-1392
PHP 4.0 with cURL functions allows remote attackers to bypass the open_basedir setting and read arbitrary files via a file: URL argument to the curl_init function.
Products affected by CVE-2004-1392
- cpe:2.3:a:php:php:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.1:patch2:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.1:patch1:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.3:patch1:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.7:rc3:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.7:rc1:*:*:*:*:*:*
- cpe:2.3:a:php:php:4.0.7:rc2:*:*:*:*:*:*
Threat overview for CVE-2004-1392
Top countries where our scanners detected CVE-2004-1392
Top open port discovered on systems with this issue
80
IPs affected by CVE-2004-1392 139
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2004-1392!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2004-1392
0.89%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 80 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2004-1392
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
Vendor statements for CVE-2004-1392
-
Red Hat 2006-08-30We do not consider these to be security issues: http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1
References for CVE-2004-1392
-
http://marc.info/?l=bugtraq&m=110625060220934&w=2
-
http://www.redhat.com/support/errata/RHSA-2005-406.html
-
http://marc.info/?l=bugtraq&m=109898213806099&w=2
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9279
-
http://securitytracker.com/id?1011984
Exploit
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/17900
-
https://bugzilla.fedora.us/show_bug.cgi?id=2344
Patch
-
http://www.redhat.com/support/errata/RHSA-2005-405.html
-
http://www.securityfocus.com/bid/11557
Exploit;Patch
Jump to