Description
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
Remediation
References
Related Vulnerabilities
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2018-10237)
WordPress Permissions, Privileges, and Access Controls Vulnerability (CVE-2010-5293)
WordPress Plugin Ultimate Addons for Elementor Security Bypass (1.24.1)
WordPress Plugin WP Print Friendly Cross-Site Scripting (0.6)