Description
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
Remediation
References
Related Vulnerabilities
WordPress 4.8.x Cross-Domain Flash Injection Vulnerability (4.8 - 4.8.4)
Beego Framework Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2024-40465)
Liferay DXP URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2022-28977)
WordPress Plugin Video Conferencing with Zoom Cross-Site Scripting (4.0.9)