Description
The proc_open function in ext/standard/proc_open.c in PHP before 5.2.11 and 5.3.x before 5.3.1 does not enforce the (1) safe_mode_allowed_env_vars and (2) safe_mode_protected_env_vars directives, which allows context-dependent attackers to execute programs with an arbitrary environment via the env parameter, as demonstrated by a crafted value of the LD_LIBRARY_PATH environment variable.
Remediation
References
Related Vulnerabilities
Oracle Database Server CVE-2019-2753 Vulnerability (CVE-2019-2753)
WordPress Plugin Shantz WordPress QOTD Cross-Site Request Forgery (1.2.2)
WordPress Plugin Arigato Autoresponder and Newsletter Multiple Vulnerabilities (2.5.1.6)
WordPress Plugin SAML SP Single Sign On-SSO login Unspecified Vulnerability (4.8.75)
WordPress Plugin Nested Pages Cross-Site Scripting (1.6.5.2)