CVE-2007-1369 – Zend Platform 2.2.1 - 'PHP.INI' File Modification
https://notcve.org/view.php?id=CVE-2007-1369
ini_modifier (sgid-zendtech) in Zend Platform 2.2.3 and earlier allows local users to modify the system php.ini file by editing a copy of php.ini file using the -f parameter, and then performing a symlink attack using the directory that contains the attacker-controlled php.ini file, and linking this directory to /usr/local/Zend/etc. ini_modifier (sgid-zendtech) en Zend Platform 2.2.3 y anteriores permite a usuarios locales modificar el archvio de sistema php.ini a través de la edición de una copia del archivo php.ini utilizando el parámetro -f, y entonces realizando un ataque de enlaces simbólicos usando el directorio que contiene el archivo atacante-bajo control de php.ini, y enlazando a este directorio a /usr/local/Zend/etc. • https://www.exploit-db.com/exploits/29712 http://osvdb.org/33930 http://secunia.com/advisories/24501 http://www.osvdb.org/32773 http://www.php-security.org/MOPB/BONUS-07-2007.html http://www.securityfocus.com/bid/22802 http://www.vupen.com/english/advisories/2007/0829 http://www.zend.com/products/zend_platform/security_vulnerabilities https://exchange.xforce.ibmcloud.com/vulnerabilities/32820 •
CVE-2006-4432
https://notcve.org/view.php?id=CVE-2006-4432
Directory traversal vulnerability in Zend Platform 2.2.1 and earlier allows remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the final component of the PHP session identifier (PHPSESSID). NOTE: in some cases, this issue can be leveraged to perform direct static code injection. Vulnerabilidad de atravesamiento de directorios en Zend Platform 2.2.1 y anteriores permite a atacantes remotos sobrescribir archivos de su elección mediante una secuencia .. (punto punto) en el componente final del identificador de sesión PHP (PHPSESSID). • http://secunia.com/advisories/21573 http://securityreason.com/securityalert/1466 http://www.hardened-php.net/advisory_052006.128.html http://www.osvdb.org/28232 http://www.securityfocus.com/archive/1/444263/100/0/threaded http://www.vupen.com/english/advisories/2006/3388 https://exchange.xforce.ibmcloud.com/vulnerabilities/28576 •
CVE-2006-4431
https://notcve.org/view.php?id=CVE-2006-4431
Multiple buffer overflows in the (a) Session Clustering Daemon and the (b) mod_cluster module in the Zend Platform 2.2.1 and earlier allow remote attackers to cause a denial of service (crash) or execute arbitrary code via a (1) empty or (2) crafted PHP session identifier (PHPSESSID). Múltiples desbordamientos de búfer en el (a) Session Clustering Daemon y el módulo (b) mod_cluster en Zend Platform 2.2.1 y versiones anteriores permiten a atacantes remotos provocar una denegación de servicio (caída) o ejecutar código arbitrario a través de un identificador de sesión PHP (PHPSESSID) (1) vacio o (2) manipulado. • http://marc.info/?l=full-disclosure&m=115642248226217&w=2 http://secunia.com/advisories/21573 http://securityreason.com/securityalert/1466 http://www.hardened-php.net/advisory_052006.128.html http://www.osvdb.org/28230 http://www.osvdb.org/28231 http://www.securityfocus.com/archive/1/444263/100/0/threaded http://www.securityfocus.com/bid/19692 http://www.vupen.com/english/advisories/2006/3388 https://exchange.xforce.ibmcloud.com/vulnerabilities/28573 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •