Search criteria

15 vulnerabilities found for pear by php

FKIE_CVE-2017-5630

Vulnerability from fkie_nvd - Published: 2017-02-01 23:59 - Updated: 2025-04-20 01:37
Summary
PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.
Impacted products
Vendor Product Version
php pear 1.10.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:php:pear:1.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CF8958FB-0D66-4B79-90F4-B363BF62BD79",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite."
    },
    {
      "lang": "es",
      "value": "PECL en la clase de utilidad de descarga en el Instalador en PEAR Base System v1.10.1 no valida los tipos de archivo y los nombres de archivo despu\u00e9s de una redirecci\u00f3n, lo que permite a los servidores remotos HTTP sobrescribir los archivos a trav\u00e9s de respuestas manipuladas, como se demuestra por una sobreescritura .htaccess."
    }
  ],
  "id": "CVE-2017-5630",
  "lastModified": "2025-04-20T01:37:25.860",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "HIGH",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2017-02-01T23:59:00.137",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://pear.php.net/bugs/bug.php?id=21171"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95882"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/41185/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://pear.php.net/bugs/bug.php?id=21171"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "http://www.securityfocus.com/bid/95882"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Third Party Advisory",
        "VDB Entry"
      ],
      "url": "https://www.exploit-db.com/exploits/41185/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-74"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1144

Vulnerability from fkie_nvd - Published: 2011-03-03 01:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072.
Impacted products
Vendor Product Version
php pear *
php pear 0.2.2
php pear 0.9
php pear 0.10
php pear 0.11
php pear 0.90
php pear 1.0
php pear 1.0.1
php pear 1.1
php pear 1.2
php pear 1.2.1
php pear 1.3
php pear 1.3.1
php pear 1.3.3
php pear 1.3.3.1
php pear 1.3.4
php pear 1.3.5
php pear 1.3.6
php pear 1.4.0
php pear 1.4.0
php pear 1.4.0
php pear 1.4.1
php pear 1.4.2
php pear 1.5.0
php pear 1.5.1
php pear 1.6.1
php pear 1.9.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:php:pear:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB14E5AC-4437-49C9-AB59-0C2894ABA386",
              "versionEndIncluding": "1.9.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84D97436-9B7F-4721-9741-46440671EF13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB3ABD1F-BCB7-412E-BF9C-3E3753E35C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A286382-1A8E-4A85-969E-E86B2991FD03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4609FA08-77D8-477F-BF06-EF1DCCF304EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C03D94-A42D-4B94-A772-F224B7A51DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F2D5A6D-5F13-4170-895C-7D9766D66E92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E70348B-DD40-4312-BEC1-5B70DE0502F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7183C6B-7916-4A9C-86B2-A1ADF2657FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "96B6D2DE-FFAA-47DD-B7F9-9D4A8AD5D86F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B18D859-6AEB-416B-AD65-549664AC7702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "25D84F7B-61EF-4609-AA12-092A82752A73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E691BDA-A3C4-4355-9B3B-CF4629234E0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15572C2-8A38-47BC-B816-D38465B3DF7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C78AE7-1F68-4778-B47F-3926CCD4909B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D2C0038-0B34-45C4-8E12-CB16E29D5A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "92E6FEDC-D820-4F24-855F-457201A7E108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B071F3AA-120E-4ED0-951B-E3E758C9B868",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E807C846-21A6-40DA-898C-81621C917C48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E5187149-A430-4C18-A446-D63691C5DBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17D913D2-1DEB-4899-968C-CE1EE24B0F2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A00E459-5F1A-4A28-9B62-D7DB43F831B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4BB7B66-B10C-42E0-BDD5-919A724D270E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7998B44-CABB-478C-B163-96842C8259D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF8D84FB-E7CD-4C23-AA3B-0B41492F9939",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2930CA3C-58D3-4DE0-969C-6B1C036A463F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E8E8AEE-2369-4ACF-8546-B5C92DDFA338",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072."
    },
    {
      "lang": "es",
      "value": "El instalador de PEAR 1.9.2 y versiones anteriores permite a los usuarios locales sobreescribir archivos de su elecci\u00f3n a trav\u00e9s de un ataque de enlace simb\u00f3lico (\"symlink attack\") en el fichero package.xml. Relacionado con los directorios (1) download_dir, (2) cache_dir, (3) tmp_dir y (4) pear-build-download.  NOTA: esta vulnerabilidad existe debido a una soluci\u00f3n incompleta del CVE-2011-1072."
    }
  ],
  "id": "CVE-2011-1144",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-03-03T01:00:01.677",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://pear.php.net/bugs/bug.php?id=18056"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65911"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://pear.php.net/bugs/bug.php?id=18056"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65911"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2011-1072

Vulnerability from fkie_nvd - Published: 2011-03-03 01:00 - Updated: 2025-04-11 00:51
Severity ?
Summary
The installer in PEAR before 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories, a different vulnerability than CVE-2007-2519.
References
secalert@redhat.comhttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164
secalert@redhat.comhttp://news.php.net/php.pear.cvs/61264Patch
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/02/28/12
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/02/28/3
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/02/28/5
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/03/01/4
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/03/01/5
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/03/01/7
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/03/01/8
secalert@redhat.comhttp://openwall.com/lists/oss-security/2011/03/01/9
secalert@redhat.comhttp://pear.php.net/advisory-20110228.txtVendor Advisory
secalert@redhat.comhttp://pear.php.net/bugs/bug.php?id=18056Exploit
secalert@redhat.comhttp://secunia.com/advisories/43533Vendor Advisory
secalert@redhat.comhttp://security-tracker.debian.org/tracker/CVE-2011-1072
secalert@redhat.comhttp://svn.php.net/viewvc?view=revision&revision=308687Patch
secalert@redhat.comhttp://www.mandriva.com/security/advisories?name=MDVSA-2011:187
secalert@redhat.comhttp://www.redhat.com/support/errata/RHSA-2011-1741.html
secalert@redhat.comhttp://www.securityfocus.com/bid/46605
secalert@redhat.comhttps://exchange.xforce.ibmcloud.com/vulnerabilities/65721
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164
af854a3a-2127-422b-91ae-364da2661108http://news.php.net/php.pear.cvs/61264Patch
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/02/28/12
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/02/28/3
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/02/28/5
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/03/01/4
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/03/01/5
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/03/01/7
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/03/01/8
af854a3a-2127-422b-91ae-364da2661108http://openwall.com/lists/oss-security/2011/03/01/9
af854a3a-2127-422b-91ae-364da2661108http://pear.php.net/advisory-20110228.txtVendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://pear.php.net/bugs/bug.php?id=18056Exploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/43533Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://security-tracker.debian.org/tracker/CVE-2011-1072
af854a3a-2127-422b-91ae-364da2661108http://svn.php.net/viewvc?view=revision&revision=308687Patch
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDVSA-2011:187
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2011-1741.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/46605
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/65721
Impacted products
Vendor Product Version
php pear *
php pear 0.2.2
php pear 0.9
php pear 0.10
php pear 0.11
php pear 0.90
php pear 1.0
php pear 1.0.1
php pear 1.1
php pear 1.2
php pear 1.2.1
php pear 1.3
php pear 1.3.1
php pear 1.3.3
php pear 1.3.3.1
php pear 1.3.4
php pear 1.3.5
php pear 1.3.6
php pear 1.4.0
php pear 1.4.0
php pear 1.4.0
php pear 1.4.1
php pear 1.4.2
php pear 1.5.0
php pear 1.5.1
php pear 1.6.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:php:pear:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C9E155D9-39F7-4758-B877-E3E0E54FDA26",
              "versionEndIncluding": "1.9.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84D97436-9B7F-4721-9741-46440671EF13",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB3ABD1F-BCB7-412E-BF9C-3E3753E35C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A286382-1A8E-4A85-969E-E86B2991FD03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4609FA08-77D8-477F-BF06-EF1DCCF304EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C03D94-A42D-4B94-A772-F224B7A51DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F2D5A6D-5F13-4170-895C-7D9766D66E92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E70348B-DD40-4312-BEC1-5B70DE0502F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7183C6B-7916-4A9C-86B2-A1ADF2657FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "96B6D2DE-FFAA-47DD-B7F9-9D4A8AD5D86F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B18D859-6AEB-416B-AD65-549664AC7702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "25D84F7B-61EF-4609-AA12-092A82752A73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E691BDA-A3C4-4355-9B3B-CF4629234E0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15572C2-8A38-47BC-B816-D38465B3DF7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C78AE7-1F68-4778-B47F-3926CCD4909B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D2C0038-0B34-45C4-8E12-CB16E29D5A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "92E6FEDC-D820-4F24-855F-457201A7E108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B071F3AA-120E-4ED0-951B-E3E758C9B868",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E807C846-21A6-40DA-898C-81621C917C48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E5187149-A430-4C18-A446-D63691C5DBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17D913D2-1DEB-4899-968C-CE1EE24B0F2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A00E459-5F1A-4A28-9B62-D7DB43F831B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C4BB7B66-B10C-42E0-BDD5-919A724D270E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D7998B44-CABB-478C-B163-96842C8259D3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FF8D84FB-E7CD-4C23-AA3B-0B41492F9939",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2930CA3C-58D3-4DE0-969C-6B1C036A463F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The installer in PEAR before 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories, a different vulnerability than CVE-2007-2519."
    },
    {
      "lang": "es",
      "value": "El instalador de PEAR en versiones anteriores a la 1.9.2 permite a usuarios locales sobreescribir ficheros de su elecci\u00f3n a trav\u00e9s de un ataque de enlace simb\u00f3lico (\"symlink attack\") en el fichero package.xml. Relacionado con los directorios (1) download_dir, (2) cache_dir, (3) tmp_dir y (4) pear-build-download. Una vulnerabilidad distinta a la CVE-2007-2519."
    }
  ],
  "id": "CVE-2011-1072",
  "lastModified": "2025-04-11T00:51:21.963",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:M/Au:N/C:N/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2011-03-03T01:00:01.257",
  "references": [
    {
      "source": "secalert@redhat.com",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://news.php.net/php.pear.cvs/61264"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/02/28/12"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/02/28/3"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://pear.php.net/advisory-20110228.txt"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Exploit"
      ],
      "url": "http://pear.php.net/bugs/bug.php?id=18056"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43533"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://security-tracker.debian.org/tracker/CVE-2011-1072"
    },
    {
      "source": "secalert@redhat.com",
      "tags": [
        "Patch"
      ],
      "url": "http://svn.php.net/viewvc?view=revision\u0026revision=308687"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:187"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1741.html"
    },
    {
      "source": "secalert@redhat.com",
      "url": "http://www.securityfocus.com/bid/46605"
    },
    {
      "source": "secalert@redhat.com",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65721"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://news.php.net/php.pear.cvs/61264"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/02/28/12"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/02/28/3"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://pear.php.net/advisory-20110228.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://pear.php.net/bugs/bug.php?id=18056"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/43533"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security-tracker.debian.org/tracker/CVE-2011-1072"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://svn.php.net/viewvc?view=revision\u0026revision=308687"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:187"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2011-1741.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/46605"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65721"
    }
  ],
  "sourceIdentifier": "secalert@redhat.com",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-59"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2006-0144

Vulnerability from fkie_nvd - Published: 2006-01-09 23:03 - Updated: 2025-04-03 01:03

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:apache2triad:apache2triad:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C44D19A3-341A-4241-9D12-63BF1C69276B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "84D97436-9B7F-4721-9741-46440671EF13",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function."
    }
  ],
  "id": "CVE-2006-0144",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-01-09T23:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://apache2triad.net/forums/viewtopic.php?p=14670"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18390"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/421469/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/16174"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/0148"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24076"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://apache2triad.net/forums/viewtopic.php?p=14670"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/18390"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/421469/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/16174"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2006/0148"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24076"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2005-4154

Vulnerability from fkie_nvd - Published: 2005-12-11 02:03 - Updated: 2025-04-03 01:03
Severity ?
Summary
Unspecified vulnerability in PEAR installer 1.4.2 and earlier allows user-assisted attackers to execute arbitrary code via a crafted package that can execute code when the pear command is executed or when the Web/Gtk frontend is loaded.
Impacted products
Vendor Product Version
php pear *
php pear 0.9
php pear 0.10
php pear 0.11
php pear 0.90
php pear 1.0
php pear 1.0.1
php pear 1.1
php pear 1.2
php pear 1.2.1
php pear 1.3
php pear 1.3.1
php pear 1.3.3
php pear 1.3.3.1
php pear 1.3.4
php pear 1.3.5
php pear 1.3.6
php pear 1.4.0
php pear 1.4.0
php pear 1.4.0
php pear 1.4.1

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:php:pear:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "2661398E-6268-4B08-82A9-B594ED53475D",
              "versionEndIncluding": "1.4.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BB3ABD1F-BCB7-412E-BF9C-3E3753E35C54",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A286382-1A8E-4A85-969E-E86B2991FD03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4609FA08-77D8-477F-BF06-EF1DCCF304EB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:0.90:*:*:*:*:*:*:*",
              "matchCriteriaId": "85C03D94-A42D-4B94-A772-F224B7A51DBA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "1F2D5A6D-5F13-4170-895C-7D9766D66E92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E70348B-DD40-4312-BEC1-5B70DE0502F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7183C6B-7916-4A9C-86B2-A1ADF2657FCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "96B6D2DE-FFAA-47DD-B7F9-9D4A8AD5D86F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2B18D859-6AEB-416B-AD65-549664AC7702",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "25D84F7B-61EF-4609-AA12-092A82752A73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3E691BDA-A3C4-4355-9B3B-CF4629234E0D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B15572C2-8A38-47BC-B816-D38465B3DF7C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1C78AE7-1F68-4778-B47F-3926CCD4909B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D2C0038-0B34-45C4-8E12-CB16E29D5A88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "92E6FEDC-D820-4F24-855F-457201A7E108",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.3.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "B071F3AA-120E-4ED0-951B-E3E758C9B868",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E807C846-21A6-40DA-898C-81621C917C48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "E5187149-A430-4C18-A446-D63691C5DBC4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "17D913D2-1DEB-4899-968C-CE1EE24B0F2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:php:pear:1.4.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A00E459-5F1A-4A28-9B62-D7DB43F831B2",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in PEAR installer 1.4.2 and earlier allows user-assisted attackers to execute arbitrary code via a crafted package that can execute code when the pear command is executed or when the Web/Gtk frontend is loaded."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificad en el PEAR installer 1.4.2 y anteriores permite a atacantes con la implicaci\u00f3n de los usuarios ejecutar c\u00f3digo de su elecci\u00f3n mediante un paquete artesanal que puede ejecutar c\u00f3idog cuando el comando \u0027pear\u0027 es ejecutado cuando el frontal Web/Gtk es cargado."
    }
  ],
  "id": "CVE-2005-4154",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "HIGH",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.1,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 4.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2005-12-11T02:03:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://pear.php.net/advisory-20051104.txt"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17563/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/alerts/2005/Nov/1015161.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2444"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23021"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://pear.php.net/advisory-20051104.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/17563/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://securitytracker.com/alerts/2005/Nov/1015161.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.vupen.com/english/advisories/2005/2444"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23021"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2017-5630 (GCVE-0-2017-5630)

Vulnerability from cvelistv5 – Published: 2017-02-01 23:00 – Updated: 2024-08-05 15:04
VLAI?
Summary
PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:04:15.355Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "41185",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41185/"
          },
          {
            "name": "95882",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95882"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://pear.php.net/bugs/bug.php?id=21171"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-02-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-01T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "41185",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41185/"
        },
        {
          "name": "95882",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95882"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://pear.php.net/bugs/bug.php?id=21171"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-5630",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "41185",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41185/"
            },
            {
              "name": "95882",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95882"
            },
            {
              "name": "http://pear.php.net/bugs/bug.php?id=21171",
              "refsource": "MISC",
              "url": "http://pear.php.net/bugs/bug.php?id=21171"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-5630",
    "datePublished": "2017-02-01T23:00:00",
    "dateReserved": "2017-01-29T00:00:00",
    "dateUpdated": "2024-08-05T15:04:15.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1144 (GCVE-0-2011-1144)

Vulnerability from cvelistv5 – Published: 2011-03-03 00:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:27.851Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://pear.php.net/bugs/bug.php?id=18056"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
          },
          {
            "name": "pear-package-symlink(65911)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65911"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://pear.php.net/bugs/bug.php?id=18056"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
        },
        {
          "name": "pear-package-symlink(65911)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65911"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1144",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
            },
            {
              "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
            },
            {
              "name": "http://pear.php.net/bugs/bug.php?id=18056",
              "refsource": "MISC",
              "url": "http://pear.php.net/bugs/bug.php?id=18056"
            },
            {
              "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
            },
            {
              "name": "pear-package-symlink(65911)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65911"
            },
            {
              "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
            },
            {
              "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
            },
            {
              "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1144",
    "datePublished": "2011-03-03T00:00:00",
    "dateReserved": "2011-03-02T00:00:00",
    "dateUpdated": "2024-08-06T22:14:27.851Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1072 (GCVE-0-2011-1072)

Vulnerability from cvelistv5 – Published: 2011-03-03 00:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
The installer in PEAR before 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories, a different vulnerability than CVE-2007-2519.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:27.808Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164"
          },
          {
            "name": "43533",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43533"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
          },
          {
            "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/02/28/12"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://news.php.net/php.pear.cvs/61264"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security-tracker.debian.org/tracker/CVE-2011-1072"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
          },
          {
            "name": "RHSA-2011:1741",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-1741.html"
          },
          {
            "name": "MDVSA-2011:187",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:187"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://pear.php.net/bugs/bug.php?id=18056"
          },
          {
            "name": "[oss-security] 20110228 CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/02/28/3"
          },
          {
            "name": "pear-pear-installer-symlink(65721)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65721"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://svn.php.net/viewvc?view=revision\u0026revision=308687"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://pear.php.net/advisory-20110228.txt"
          },
          {
            "name": "46605",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46605"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The installer in PEAR before 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories, a different vulnerability than CVE-2007-2519."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164"
        },
        {
          "name": "43533",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43533"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
        },
        {
          "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/02/28/12"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://news.php.net/php.pear.cvs/61264"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security-tracker.debian.org/tracker/CVE-2011-1072"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
        },
        {
          "name": "RHSA-2011:1741",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-1741.html"
        },
        {
          "name": "MDVSA-2011:187",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:187"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://pear.php.net/bugs/bug.php?id=18056"
        },
        {
          "name": "[oss-security] 20110228 CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/02/28/3"
        },
        {
          "name": "pear-pear-installer-symlink(65721)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65721"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://svn.php.net/viewvc?view=revision\u0026revision=308687"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://pear.php.net/advisory-20110228.txt"
        },
        {
          "name": "46605",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46605"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1072",
    "datePublished": "2011-03-03T00:00:00",
    "dateReserved": "2011-02-24T00:00:00",
    "dateUpdated": "2024-08-06T22:14:27.808Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0144 (GCVE-0-2006-0144)

Vulnerability from cvelistv5 – Published: 2006-01-09 23:00 – Updated: 2024-08-07 16:25
VLAI?
Summary
The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:25:33.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-0148",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0148"
          },
          {
            "name": "16174",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16174"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://apache2triad.net/forums/viewtopic.php?p=14670"
          },
          {
            "name": "18390",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18390"
          },
          {
            "name": "gopear-proxy-redirection(24076)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24076"
          },
          {
            "name": "20060109 New PEAR / Apache2Triad Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/421469/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-0148",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0148"
        },
        {
          "name": "16174",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16174"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://apache2triad.net/forums/viewtopic.php?p=14670"
        },
        {
          "name": "18390",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18390"
        },
        {
          "name": "gopear-proxy-redirection(24076)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24076"
        },
        {
          "name": "20060109 New PEAR / Apache2Triad Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/421469/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0144",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-0148",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0148"
            },
            {
              "name": "16174",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16174"
            },
            {
              "name": "http://apache2triad.net/forums/viewtopic.php?p=14670",
              "refsource": "CONFIRM",
              "url": "http://apache2triad.net/forums/viewtopic.php?p=14670"
            },
            {
              "name": "18390",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18390"
            },
            {
              "name": "gopear-proxy-redirection(24076)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24076"
            },
            {
              "name": "20060109 New PEAR / Apache2Triad Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/421469/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0144",
    "datePublished": "2006-01-09T23:00:00",
    "dateReserved": "2006-01-09T00:00:00",
    "dateUpdated": "2024-08-07T16:25:33.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4154 (GCVE-0-2005-4154)

Vulnerability from cvelistv5 – Published: 2005-12-11 02:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
Unspecified vulnerability in PEAR installer 1.4.2 and earlier allows user-assisted attackers to execute arbitrary code via a crafted package that can execute code when the pear command is executed or when the Web/Gtk frontend is loaded.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:38:50.434Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "pear-installer-code-execution(23021)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23021"
          },
          {
            "name": "17563",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17563/"
          },
          {
            "name": "1015161",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/alerts/2005/Nov/1015161.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://pear.php.net/advisory-20051104.txt"
          },
          {
            "name": "ADV-2005-2444",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2444"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-11-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in PEAR installer 1.4.2 and earlier allows user-assisted attackers to execute arbitrary code via a crafted package that can execute code when the pear command is executed or when the Web/Gtk frontend is loaded."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "pear-installer-code-execution(23021)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23021"
        },
        {
          "name": "17563",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17563/"
        },
        {
          "name": "1015161",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/alerts/2005/Nov/1015161.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://pear.php.net/advisory-20051104.txt"
        },
        {
          "name": "ADV-2005-2444",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2444"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4154",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in PEAR installer 1.4.2 and earlier allows user-assisted attackers to execute arbitrary code via a crafted package that can execute code when the pear command is executed or when the Web/Gtk frontend is loaded."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "pear-installer-code-execution(23021)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23021"
            },
            {
              "name": "17563",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17563/"
            },
            {
              "name": "1015161",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/alerts/2005/Nov/1015161.html"
            },
            {
              "name": "http://pear.php.net/advisory-20051104.txt",
              "refsource": "CONFIRM",
              "url": "http://pear.php.net/advisory-20051104.txt"
            },
            {
              "name": "ADV-2005-2444",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2444"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4154",
    "datePublished": "2005-12-11T02:00:00",
    "dateReserved": "2005-12-11T00:00:00",
    "dateUpdated": "2024-08-07T23:38:50.434Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2017-5630 (GCVE-0-2017-5630)

Vulnerability from nvd – Published: 2017-02-01 23:00 – Updated: 2024-08-05 15:04
VLAI?
Summary
PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T15:04:15.355Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "41185",
            "tags": [
              "exploit",
              "x_refsource_EXPLOIT-DB",
              "x_transferred"
            ],
            "url": "https://www.exploit-db.com/exploits/41185/"
          },
          {
            "name": "95882",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/95882"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://pear.php.net/bugs/bug.php?id=21171"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2017-02-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-01T09:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "41185",
          "tags": [
            "exploit",
            "x_refsource_EXPLOIT-DB"
          ],
          "url": "https://www.exploit-db.com/exploits/41185/"
        },
        {
          "name": "95882",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/95882"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://pear.php.net/bugs/bug.php?id=21171"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2017-5630",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "41185",
              "refsource": "EXPLOIT-DB",
              "url": "https://www.exploit-db.com/exploits/41185/"
            },
            {
              "name": "95882",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/95882"
            },
            {
              "name": "http://pear.php.net/bugs/bug.php?id=21171",
              "refsource": "MISC",
              "url": "http://pear.php.net/bugs/bug.php?id=21171"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2017-5630",
    "datePublished": "2017-02-01T23:00:00",
    "dateReserved": "2017-01-29T00:00:00",
    "dateUpdated": "2024-08-05T15:04:15.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1144 (GCVE-0-2011-1144)

Vulnerability from nvd – Published: 2011-03-03 00:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:27.851Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://pear.php.net/bugs/bug.php?id=18056"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
          },
          {
            "name": "pear-package-symlink(65911)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65911"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://pear.php.net/bugs/bug.php?id=18056"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
        },
        {
          "name": "pear-package-symlink(65911)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65911"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1144",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The installer in PEAR 1.9.2 and earlier allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories.  NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-1072."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
            },
            {
              "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
            },
            {
              "name": "http://pear.php.net/bugs/bug.php?id=18056",
              "refsource": "MISC",
              "url": "http://pear.php.net/bugs/bug.php?id=18056"
            },
            {
              "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
            },
            {
              "name": "pear-package-symlink(65911)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65911"
            },
            {
              "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
            },
            {
              "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
            },
            {
              "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
              "refsource": "MLIST",
              "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1144",
    "datePublished": "2011-03-03T00:00:00",
    "dateReserved": "2011-03-02T00:00:00",
    "dateUpdated": "2024-08-06T22:14:27.851Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2011-1072 (GCVE-0-2011-1072)

Vulnerability from nvd – Published: 2011-03-03 00:00 – Updated: 2024-08-06 22:14
VLAI?
Summary
The installer in PEAR before 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories, a different vulnerability than CVE-2007-2519.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:14:27.808Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164"
          },
          {
            "name": "43533",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43533"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
          },
          {
            "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/02/28/12"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://news.php.net/php.pear.cvs/61264"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://security-tracker.debian.org/tracker/CVE-2011-1072"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
          },
          {
            "name": "RHSA-2011:1741",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-1741.html"
          },
          {
            "name": "MDVSA-2011:187",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:187"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://pear.php.net/bugs/bug.php?id=18056"
          },
          {
            "name": "[oss-security] 20110228 CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/02/28/3"
          },
          {
            "name": "pear-pear-installer-symlink(65721)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65721"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://svn.php.net/viewvc?view=revision\u0026revision=308687"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://pear.php.net/advisory-20110228.txt"
          },
          {
            "name": "46605",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/46605"
          },
          {
            "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-02-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The installer in PEAR before 1.9.2 allows local users to overwrite arbitrary files via a symlink attack on the package.xml file, related to the (1) download_dir, (2) cache_dir, (3) tmp_dir, and (4) pear-build-download directories, a different vulnerability than CVE-2007-2519."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/02/28/5"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/7"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=546164"
        },
        {
          "name": "43533",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43533"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/8"
        },
        {
          "name": "[oss-security] 20110228 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/02/28/12"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://news.php.net/php.pear.cvs/61264"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://security-tracker.debian.org/tracker/CVE-2011-1072"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/5"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/4"
        },
        {
          "name": "RHSA-2011:1741",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-1741.html"
        },
        {
          "name": "MDVSA-2011:187",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:187"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://pear.php.net/bugs/bug.php?id=18056"
        },
        {
          "name": "[oss-security] 20110228 CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/02/28/3"
        },
        {
          "name": "pear-pear-installer-symlink(65721)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65721"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://svn.php.net/viewvc?view=revision\u0026revision=308687"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://pear.php.net/advisory-20110228.txt"
        },
        {
          "name": "46605",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/46605"
        },
        {
          "name": "[oss-security] 20110301 Re: CVE Request: PEAR Installer 1.9.1 \u003c= - Symlink Attack",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://openwall.com/lists/oss-security/2011/03/01/9"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2011-1072",
    "datePublished": "2011-03-03T00:00:00",
    "dateReserved": "2011-02-24T00:00:00",
    "dateUpdated": "2024-08-06T22:14:27.808Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0144 (GCVE-0-2006-0144)

Vulnerability from nvd – Published: 2006-01-09 23:00 – Updated: 2024-08-07 16:25
VLAI?
Summary
The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:25:33.562Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-0148",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/0148"
          },
          {
            "name": "16174",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/16174"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://apache2triad.net/forums/viewtopic.php?p=14670"
          },
          {
            "name": "18390",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/18390"
          },
          {
            "name": "gopear-proxy-redirection(24076)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24076"
          },
          {
            "name": "20060109 New PEAR / Apache2Triad Exploit",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/421469/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-01-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "ADV-2006-0148",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/0148"
        },
        {
          "name": "16174",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/16174"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://apache2triad.net/forums/viewtopic.php?p=14670"
        },
        {
          "name": "18390",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/18390"
        },
        {
          "name": "gopear-proxy-redirection(24076)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24076"
        },
        {
          "name": "20060109 New PEAR / Apache2Triad Exploit",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/421469/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-0144",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The proxy server feature in go-pear.php in PHP PEAR 0.2.2, as used in Apache2Triad, allows remote attackers to execute arbitrary PHP code by redirecting go-pear.php to a malicious proxy server that provides a modified version of Tar.php with a malicious extractModify function."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-0148",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/0148"
            },
            {
              "name": "16174",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/16174"
            },
            {
              "name": "http://apache2triad.net/forums/viewtopic.php?p=14670",
              "refsource": "CONFIRM",
              "url": "http://apache2triad.net/forums/viewtopic.php?p=14670"
            },
            {
              "name": "18390",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/18390"
            },
            {
              "name": "gopear-proxy-redirection(24076)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24076"
            },
            {
              "name": "20060109 New PEAR / Apache2Triad Exploit",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/421469/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-0144",
    "datePublished": "2006-01-09T23:00:00",
    "dateReserved": "2006-01-09T00:00:00",
    "dateUpdated": "2024-08-07T16:25:33.562Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2005-4154 (GCVE-0-2005-4154)

Vulnerability from nvd – Published: 2005-12-11 02:00 – Updated: 2024-08-07 23:38
VLAI?
Summary
Unspecified vulnerability in PEAR installer 1.4.2 and earlier allows user-assisted attackers to execute arbitrary code via a crafted package that can execute code when the pear command is executed or when the Web/Gtk frontend is loaded.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T23:38:50.434Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "pear-installer-code-execution(23021)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23021"
          },
          {
            "name": "17563",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/17563/"
          },
          {
            "name": "1015161",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/alerts/2005/Nov/1015161.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://pear.php.net/advisory-20051104.txt"
          },
          {
            "name": "ADV-2005-2444",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2005/2444"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2005-11-07T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in PEAR installer 1.4.2 and earlier allows user-assisted attackers to execute arbitrary code via a crafted package that can execute code when the pear command is executed or when the Web/Gtk frontend is loaded."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-19T15:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "pear-installer-code-execution(23021)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23021"
        },
        {
          "name": "17563",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/17563/"
        },
        {
          "name": "1015161",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/alerts/2005/Nov/1015161.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://pear.php.net/advisory-20051104.txt"
        },
        {
          "name": "ADV-2005-2444",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2005/2444"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2005-4154",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in PEAR installer 1.4.2 and earlier allows user-assisted attackers to execute arbitrary code via a crafted package that can execute code when the pear command is executed or when the Web/Gtk frontend is loaded."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "pear-installer-code-execution(23021)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/23021"
            },
            {
              "name": "17563",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/17563/"
            },
            {
              "name": "1015161",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/alerts/2005/Nov/1015161.html"
            },
            {
              "name": "http://pear.php.net/advisory-20051104.txt",
              "refsource": "CONFIRM",
              "url": "http://pear.php.net/advisory-20051104.txt"
            },
            {
              "name": "ADV-2005-2444",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2005/2444"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2005-4154",
    "datePublished": "2005-12-11T02:00:00",
    "dateReserved": "2005-12-11T00:00:00",
    "dateUpdated": "2024-08-07T23:38:50.434Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}