CVE-2007-2519
Summary
| CVE | CVE-2007-2519 |
|---|---|
| State | PUBLISHED |
| Assigner | mitre |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-05-22 19:30:00 UTC |
| Updated | 2026-04-23 00:35:47 UTC |
| Description | Directory traversal vulnerability in the installer in PEAR 1.0 through 1.5.3 allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in the (1) install-as attribute in the file element in package.xml 1.0 or the (2) as attribute in the install element in package.xml 2.0. NOTE: it could be argued that this does not cross privilege boundaries in typical installations, since the code being installed could perform the same actions. |
Risk And Classification
Primary CVSS: v2.0 6.8 from [email protected]
AV:N/AC:M/Au:N/C:P/I:P/A:P
Problem Types: NVD-CWE-Other | n/a
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
MediumAuthentication
NoneConfidentiality
PartialIntegrity
PartialAvailability
PartialAV:N/AC:M/Au:N/C:P/I:P/A:P
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Php Group | Pear | 1.0 | All | All | All |
| Application | Php Group | Pear | 1.0.1 | All | All | All |
| Application | Php Group | Pear | 1.1 | All | All | All |
| Application | Php Group | Pear | 1.2 | All | All | All |
| Application | Php Group | Pear | 1.2.1 | All | All | All |
| Application | Php Group | Pear | 1.2b1 | All | All | All |
| Application | Php Group | Pear | 1.2b2 | All | All | All |
| Application | Php Group | Pear | 1.2b3 | All | All | All |
| Application | Php Group | Pear | 1.2b4 | All | All | All |
| Application | Php Group | Pear | 1.2b5 | All | All | All |
| Application | Php Group | Pear | 1.3 | All | All | All |
| Application | Php Group | Pear | 1.3.1 | All | All | All |
| Application | Php Group | Pear | 1.3.3 | All | All | All |
| Application | Php Group | Pear | 1.3.3.1 | All | All | All |
| Application | Php Group | Pear | 1.3.4 | All | All | All |
| Application | Php Group | Pear | 1.3.5 | All | All | All |
| Application | Php Group | Pear | 1.3.6 | All | All | All |
| Application | Php Group | Pear | 1.3b1 | All | All | All |
| Application | Php Group | Pear | 1.3b2 | All | All | All |
| Application | Php Group | Pear | 1.3b3 | All | All | All |
| Application | Php Group | Pear | 1.3b5 | All | All | All |
| Application | Php Group | Pear | 1.3b6 | All | All | All |
| Application | Php Group | Pear | 1.4.0 | All | All | All |
| Application | Php Group | Pear | 1.4.0a1 | All | All | All |
| Application | Php Group | Pear | 1.4.0a10 | All | All | All |
| Application | Php Group | Pear | 1.4.0a11 | All | All | All |
| Application | Php Group | Pear | 1.4.0a12 | All | All | All |
| Application | Php Group | Pear | 1.4.0a2 | All | All | All |
| Application | Php Group | Pear | 1.4.0a3 | All | All | All |
| Application | Php Group | Pear | 1.4.0a4 | All | All | All |
| Application | Php Group | Pear | 1.4.0a5 | All | All | All |
| Application | Php Group | Pear | 1.4.0a6 | All | All | All |
| Application | Php Group | Pear | 1.4.0a7 | All | All | All |
| Application | Php Group | Pear | 1.4.0a8 | All | All | All |
| Application | Php Group | Pear | 1.4.0a9 | All | All | All |
| Application | Php Group | Pear | 1.4.0b1 | All | All | All |
| Application | Php Group | Pear | 1.4.0b2 | All | All | All |
| Application | Php Group | Pear | 1.4.0rc1 | All | All | All |
| Application | Php Group | Pear | 1.4.0rc2 | All | All | All |
| Application | Php Group | Pear | 1.4.1 | All | All | All |
| Application | Php Group | Pear | 1.4.10 | All | All | All |
| Application | Php Group | Pear | 1.4.10rc1 | All | All | All |
| Application | Php Group | Pear | 1.4.11 | All | All | All |
| Application | Php Group | Pear | 1.4.2 | All | All | All |
| Application | Php Group | Pear | 1.4.3 | All | All | All |
| Application | Php Group | Pear | 1.4.4 | All | All | All |
| Application | Php Group | Pear | 1.4.5 | All | All | All |
| Application | Php Group | Pear | 1.4.6 | All | All | All |
| Application | Php Group | Pear | 1.4.7 | All | All | All |
| Application | Php Group | Pear | 1.4.8 | All | All | All |
| Application | Php Group | Pear | 1.4.9 | All | All | All |
| Application | Php Group | Pear | 1.5.0 | All | All | All |
| Application | Php Group | Pear | 1.5.0a1 | All | All | All |
| Application | Php Group | Pear | 1.5.0rc1 | All | All | All |
| Application | Php Group | Pear | 1.5.0rc2 | All | All | All |
| Application | Php Group | Pear | 1.5.0rc3 | All | All | All |
| Application | Php Group | Pear | 1.5.1 | All | All | All |
| Application | Php Group | Pear | 1.5.2 | All | All | All |
| Application | Php Group | Pear | 1.5.3 | All | All | All |
Vendor Declared Affected Products
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Support / Security / Advisories / / MDKSA-2007:110 | Mandriva | af854a3a-2127-422b-91ae-364da2661108 | www.mandriva.com | |
| Ubuntu update for php - Advisories - Secunia | af854a3a-2127-422b-91ae-364da2661108 | secunia.com | |
| PHP PEAR INSTALL-AS Attribute Arbitrary File Overwrite Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | |
| pear.php.net/advisory-20070507.txt | af854a3a-2127-422b-91ae-364da2661108 | pear.php.net | Exploit, Patch, Vendor Advisory |
| PEAR :: Arbitrary File Overwrite Vulnerability in the PEAR Installer | af854a3a-2127-422b-91ae-364da2661108 | pear.php.net | |
| osvdb.org/42108 | af854a3a-2127-422b-91ae-364da2661108 | osvdb.org | |
| USN-462-1: PHP vulnerabilities | Ubuntu | af854a3a-2127-422b-91ae-364da2661108 | www.ubuntu.com | |
| Webmail- OVH | af854a3a-2127-422b-91ae-364da2661108 | www.vupen.com | |
| IBM X-Force Exchange | af854a3a-2127-422b-91ae-364da2661108 | exchange.xforce.ibmcloud.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2007-05-24 | Mark J Cox | Installation of a PEAR package from an untrusted source could allow malicious code to be installed and potentially executed by the root user. This is true regardless of the existence of this particular bug in the PEAR installer, so the bug would not be treated as security-sensitive. As when handling system RPM packages, the root user must always ensure that any packages installed are from a trusted source and have been packaged correctly. |
There are currently no legacy QID mappings associated with this CVE.