Description
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
Remediation
References
Related Vulnerabilities
MyBB CVE-2020-22612 Vulnerability (CVE-2020-22612)
Moodle Uncontrolled Resource Consumption Vulnerability (CVE-2020-25630)
WordPress Plugin Augmented reality Unspecified Vulnerability (1.2.0)
WordPress Plugin Acunetix WP Security Cross-Site Request Forgery (4.0.4)
WordPress Plugin SendPress Newsletters Cross-Site Scripting (1.20.7.10)