{"containers":{"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2001-06-30T00:00:00.000Z","descriptions":[{"lang":"en","value":"PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2010-01-22T00:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"RHSA-2003:159","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2003-159.html"},{"name":"RHSA-2002:129","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2002-129.html"},{"name":"php-safemode-elevate-privileges(6787)","tags":["vdb-entry","x_refsource_XF"],"url":"http://www.iss.net/security_center/static/6787.php"},{"name":"2954","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/2954"},{"name":"20010630 php breaks safe mode","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://online.securityfocus.com/archive/1/194425"},{"name":"RHSA-2002:102","tags":["vendor-advisory","x_refsource_REDHAT"],"url":"http://www.redhat.com/support/errata/RHSA-2002-102.html"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2001-1246","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"PHP 4.0.5 through 4.1.0 in safe mode does not properly cleanse the 5th parameter to the mail() function, which allows local users and possibly remote attackers to execute arbitrary commands via shell metacharacters."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"RHSA-2003:159","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2003-159.html"},{"name":"RHSA-2002:129","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2002-129.html"},{"name":"php-safemode-elevate-privileges(6787)","refsource":"XF","url":"http://www.iss.net/security_center/static/6787.php"},{"name":"2954","refsource":"BID","url":"http://www.securityfocus.com/bid/2954"},{"name":"20010630 php breaks safe mode","refsource":"BUGTRAQ","url":"http://online.securityfocus.com/archive/1/194425"},{"name":"RHSA-2002:102","refsource":"REDHAT","url":"http://www.redhat.com/support/errata/RHSA-2002-102.html"},{"name":"http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz","refsource":"CONFIRM","url":"http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz"}]}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-08T04:51:08.236Z"},"title":"CVE Program Container","references":[{"name":"RHSA-2003:159","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2003-159.html"},{"name":"RHSA-2002:129","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2002-129.html"},{"name":"php-safemode-elevate-privileges(6787)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"http://www.iss.net/security_center/static/6787.php"},{"name":"2954","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/2954"},{"name":"20010630 php breaks safe mode","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://online.securityfocus.com/archive/1/194425"},{"name":"RHSA-2002:102","tags":["vendor-advisory","x_refsource_REDHAT","x_transferred"],"url":"http://www.redhat.com/support/errata/RHSA-2002-102.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.php.net/do_download.php?download_file=php-4.1.2.tar.gz"}]}]},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2001-1246","datePublished":"2002-06-25T04:00:00.000Z","dateReserved":"2002-05-01T00:00:00.000Z","dateUpdated":"2024-08-08T04:51:08.236Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}