Description
PHP 5.2.0 and 4.4 allows local users to bypass safe_mode and open_basedir restrictions via a malicious path and a null byte before a ";" in a session_save_path argument, followed by an allowed path, which causes a parsing inconsistency in which PHP validates the allowed path but sets session.save_path to the malicious path.
Remediation
References
Related Vulnerabilities
WordPress Plugin WP Fastest Cache Multiple Vulnerabilities (0.8.5.8)
Moodle Credentials Management Errors Vulnerability (CVE-2011-4587)
WordPress Plugin WP-UserOnline URL HTML Injection (2.62)
Magento Improper Authorization Vulnerability (CVE-2020-24402)
WordPress Plugin Custom Login Redirect Cross-Site Request Forgery (1.0.0)