session.c in the session extension in PHP before 5.2.13, and 5.3.1,
does not properly interpret ; (semicolon) characters in the argument
to the session_save_path function, which allows context-dependent
attackers to bypass open_basedir and safe_mode restrictions via an
argument that contains multiple ; characters in conjunction with a ..
Note:References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
SREASONRES:20100211 PHP 5.2.12/5.3.1 session.save_path safe_mode and open_basedir bypass
Disclaimer: The entry creation date may reflect when
the CVE-ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
This is an entry on the CVE
list, which standardizes names for security