TITLE: php-exec-dir Command Execution Bypass Vulnerability SECUNIA ADVISORY ID: SA11928 VERIFY ADVISORY: http://secunia.com/advisories/11928/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: php-exec-dir http://secunia.com/product/3612/ DESCRIPTION: VeNoMouS has reported a vulnerability in php-exec-dir, which can be exploited by malicious users to bypass certain security restrictions. php-exec-dir is used to limit execution of external commands when "safe mode" is disabled. However, it is possible to bypass this protection due to an input validation error by including a ";" character before the command to be executed. Successful exploitation requires that a user can upload PHP scripts to an affected system or specify commands in another way. SOLUTION: Use the "safe mode" functionality instead, if this kind of protection is required. PROVIDED AND/OR DISCOVERED BY: VeNoMouS ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet@packetstormsecurity.org ----------------------------------------------------------------------