CVE-2007-2519 (CNNVD-200705-428)
中文标题:
PEAR INSTALL-AS属性任意文件覆盖漏洞
英文标题:
Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted re...
漏洞描述
中文描述:
PEAR(全称PHP Extension and Application Repository)是PHP Group负责维护的一个PHP扩展及应用的代码仓库。 PEAR的安装属性实现上存在漏洞,本地攻击者可能利用此漏洞覆盖系统文件。 PEAR安装程序没有对package.xml的install-as属性或<install>标签执行验证,允许攻击者向任意位置安装文件,如果PEAR安装程序以特权用户权限运行的话,就可能覆盖关键的系统文件。 用户必须使用PEAR安装程序安装恶意软件包才会受漏洞影响。如果文件包含有类似于以下的install-as属性: <filelist> <dir name="/"> <file name="INSTALL" role="php" install-as="../../test.php" /> </dir> <!-- / --> </filelist> 或类似于以下的<file>/<install>标签: <contents> <dir name="/"> <file name="INSTALL" role="php" /> </dir> <!-- / --> </contents> ... <phprelease> <filelist> <install as="../../test.php" name="INSTALL" /> </filelist> </phprelease> 则PEAR安装程序就会将INSTALL文件安装到php_dir配置文件所指定最低目录两层之上。例如,如果php_dir为/usr/local/lib/php,install-as属性为 ../../../../etc/passwd,则PEAR安装程序就会覆盖/etc/passwd文件。
英文描述:
Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the (1) install-as attribute in the file element in package.xml 1.0 or the (2) as attribute in the install element in package.xml 2.0. NOTE: it could be argued that this does not cross privilege boundaries in typical installations, since the code being installed could perform the same actions.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| php_group | pear | 1.0 | - | - |
cpe:2.3:a:php_group:pear:1.0:*:*:*:*:*:*:*
|
| php_group | pear | 1.0.1 | - | - |
cpe:2.3:a:php_group:pear:1.0.1:*:*:*:*:*:*:*
|
| php_group | pear | 1.1 | - | - |
cpe:2.3:a:php_group:pear:1.1:*:*:*:*:*:*:*
|
| php_group | pear | 1.2 | - | - |
cpe:2.3:a:php_group:pear:1.2:*:*:*:*:*:*:*
|
| php_group | pear | 1.2.1 | - | - |
cpe:2.3:a:php_group:pear:1.2.1:*:*:*:*:*:*:*
|
| php_group | pear | 1.2b1 | - | - |
cpe:2.3:a:php_group:pear:1.2b1:*:*:*:*:*:*:*
|
| php_group | pear | 1.2b2 | - | - |
cpe:2.3:a:php_group:pear:1.2b2:*:*:*:*:*:*:*
|
| php_group | pear | 1.2b3 | - | - |
cpe:2.3:a:php_group:pear:1.2b3:*:*:*:*:*:*:*
|
| php_group | pear | 1.2b4 | - | - |
cpe:2.3:a:php_group:pear:1.2b4:*:*:*:*:*:*:*
|
| php_group | pear | 1.2b5 | - | - |
cpe:2.3:a:php_group:pear:1.2b5:*:*:*:*:*:*:*
|
| php_group | pear | 1.3 | - | - |
cpe:2.3:a:php_group:pear:1.3:*:*:*:*:*:*:*
|
| php_group | pear | 1.3.1 | - | - |
cpe:2.3:a:php_group:pear:1.3.1:*:*:*:*:*:*:*
|
| php_group | pear | 1.3.3 | - | - |
cpe:2.3:a:php_group:pear:1.3.3:*:*:*:*:*:*:*
|
| php_group | pear | 1.3.3.1 | - | - |
cpe:2.3:a:php_group:pear:1.3.3.1:*:*:*:*:*:*:*
|
| php_group | pear | 1.3.4 | - | - |
cpe:2.3:a:php_group:pear:1.3.4:*:*:*:*:*:*:*
|
| php_group | pear | 1.3.5 | - | - |
cpe:2.3:a:php_group:pear:1.3.5:*:*:*:*:*:*:*
|
| php_group | pear | 1.3.6 | - | - |
cpe:2.3:a:php_group:pear:1.3.6:*:*:*:*:*:*:*
|
| php_group | pear | 1.3b1 | - | - |
cpe:2.3:a:php_group:pear:1.3b1:*:*:*:*:*:*:*
|
| php_group | pear | 1.3b2 | - | - |
cpe:2.3:a:php_group:pear:1.3b2:*:*:*:*:*:*:*
|
| php_group | pear | 1.3b3 | - | - |
cpe:2.3:a:php_group:pear:1.3b3:*:*:*:*:*:*:*
|
| php_group | pear | 1.3b5 | - | - |
cpe:2.3:a:php_group:pear:1.3b5:*:*:*:*:*:*:*
|
| php_group | pear | 1.3b6 | - | - |
cpe:2.3:a:php_group:pear:1.3b6:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0 | - | - |
cpe:2.3:a:php_group:pear:1.4.0:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a1 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a1:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a2 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a2:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a3 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a3:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a4 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a4:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a5 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a5:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a6 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a6:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a7 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a7:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a8 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a8:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a9 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a9:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a10 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a10:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a11 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a11:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0a12 | - | - |
cpe:2.3:a:php_group:pear:1.4.0a12:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0b1 | - | - |
cpe:2.3:a:php_group:pear:1.4.0b1:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0b2 | - | - |
cpe:2.3:a:php_group:pear:1.4.0b2:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0rc1 | - | - |
cpe:2.3:a:php_group:pear:1.4.0rc1:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.0rc2 | - | - |
cpe:2.3:a:php_group:pear:1.4.0rc2:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.1 | - | - |
cpe:2.3:a:php_group:pear:1.4.1:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.2 | - | - |
cpe:2.3:a:php_group:pear:1.4.2:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.3 | - | - |
cpe:2.3:a:php_group:pear:1.4.3:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.4 | - | - |
cpe:2.3:a:php_group:pear:1.4.4:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.5 | - | - |
cpe:2.3:a:php_group:pear:1.4.5:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.6 | - | - |
cpe:2.3:a:php_group:pear:1.4.6:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.7 | - | - |
cpe:2.3:a:php_group:pear:1.4.7:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.8 | - | - |
cpe:2.3:a:php_group:pear:1.4.8:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.9 | - | - |
cpe:2.3:a:php_group:pear:1.4.9:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.10 | - | - |
cpe:2.3:a:php_group:pear:1.4.10:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.10rc1 | - | - |
cpe:2.3:a:php_group:pear:1.4.10rc1:*:*:*:*:*:*:*
|
| php_group | pear | 1.4.11 | - | - |
cpe:2.3:a:php_group:pear:1.4.11:*:*:*:*:*:*:*
|
| php_group | pear | 1.5.0 | - | - |
cpe:2.3:a:php_group:pear:1.5.0:*:*:*:*:*:*:*
|
| php_group | pear | 1.5.0a1 | - | - |
cpe:2.3:a:php_group:pear:1.5.0a1:*:*:*:*:*:*:*
|
| php_group | pear | 1.5.0rc1 | - | - |
cpe:2.3:a:php_group:pear:1.5.0rc1:*:*:*:*:*:*:*
|
| php_group | pear | 1.5.0rc2 | - | - |
cpe:2.3:a:php_group:pear:1.5.0rc2:*:*:*:*:*:*:*
|
| php_group | pear | 1.5.0rc3 | - | - |
cpe:2.3:a:php_group:pear:1.5.0rc3:*:*:*:*:*:*:*
|
| php_group | pear | 1.5.1 | - | - |
cpe:2.3:a:php_group:pear:1.5.1:*:*:*:*:*:*:*
|
| php_group | pear | 1.5.2 | - | - |
cpe:2.3:a:php_group:pear:1.5.2:*:*:*:*:*:*:*
|
| php_group | pear | 1.5.3 | - | - |
cpe:2.3:a:php_group:pear:1.5.3:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
exploitdb
exploitdb
cve.org
CVSS评分详情
AV:N/AC:M/Au:N/C:P/I:P/A:P
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2007-2519 |
2025-11-11 15:17:52 | 2025-11-11 07:32:43 |
| NVD | nvd_CVE-2007-2519 |
2025-11-11 14:52:10 | 2025-11-11 07:41:29 |
| CNNVD | cnnvd_CNNVD-200705-428 |
2025-11-11 15:08:57 | 2025-11-11 07:49:17 |
| EXPLOITDB | exploitdb_EDB-30074 |
2025-11-11 15:05:26 | 2025-11-11 08:25:21 |
版本与语言
安全公告
变更历史
查看详细变更
- references_count: 9 -> 12
- tags_count: 0 -> 4
- data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 路径遍历
- cnnvd_id: 未提取 -> CNNVD-200705-428
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 6.8
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:P/I:P/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 59
- data_sources: ['cve'] -> ['cve', 'nvd']