Description
session.c in the session extension in PHP before 5.2.13, and 5.3.1, does not properly interpret ; (semicolon) characters in the argument to the session_save_path function, which allows context-dependent attackers to bypass open_basedir and safe_mode restrictions via an argument that contains multiple ; characters in conjunction with a .. (dot dot).
Remediation
References
Related Vulnerabilities
WordPress Plugin FV Flowplayer Video Player Cross-Site Scripting (6.6.4)
WordPress Plugin Logo Carousel Cross-Site Request Forgery (1.7.4)
WordPress Plugin Qwizcards-online quizzes and flashcards Cross-Site Scripting (3.61)
WordPress Plugin Monsters Editor for WP Super Edit Arbitrary File Upload (1.1)
WordPress Plugin Booster for WooCommerce Multiple Cross-Site Scripting Vulnerabilities (5.4.8)