Description
The fopen function in PHP 5.2.0 does not properly handle invalid URI handlers, which allows context-dependent attackers to bypass safe_mode restrictions and read arbitrary files via a file path specified with an invalid URI, as demonstrated via the srpath URI.
Remediation
References
Related Vulnerabilities
Jboss EAP Allocation of Resources Without Limits or Throttling Vulnerability (CVE-2023-3171)
WordPress Plugin MiniMax-Page Layout Builder Arbitrary File Upload (1.7.1)
WordPress Plugin YITH Color and Label Variations for WooCommerce Security Bypass (1.8.11)
IBM RTC Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2014-6131)