Description
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
Remediation
References
Related Vulnerabilities
Roundcube Improper Input Validation Vulnerability (CVE-2011-1492)
WordPress Plugin Processing Embed 'pluginurl' Parameter Cross-Site Scripting (0.5)
JBoss Application Server Directory Traversal Vulnerability (CVE-2006-5750)
Moodle Configuration Vulnerability (CVE-2011-4585)
WordPress Plugin Custom Website Data Cross-Site Scripting (2.2)