Description
The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable.
Remediation
References
Related Vulnerabilities
ColdFusion CFC Deserialization RCE (CVE-2023-26359/CVE-2023-26360)
WordPress Plugin WP Font Awesome Cross-Site Scripting (1.7.8)
Moodle Incorrect Calculation Vulnerability (CVE-2022-30600)
PHP Other Vulnerability (CVE-2007-4255)
WordPress Plugin yolink Search for WordPress Cross-Site Scripting (2.5)