|  support |  documentation |  report a bug |  advanced search |  search howto |  statistics |  random bug |  login
Bug #26471 Big security hole in directory acces system
Submitted: 2003-11-30 06:13 UTC Modified: 2003-11-30 07:31 UTC
From: hdf at vipmail dot hu Assigned:
Status: Not a bug Package: *Directory/Filesystem functions
PHP Version: 4.3.3 OS: Win32
Private report: No CVE-ID: None
View Add Comment Developer Edit
Anyone can comment on a bug. Have a simpler test case? Does it work for you on a different platform? Let us know!
Just going to say 'Me too!'? Don't clutter the database with that please !
Your email address:
Solve the problem:
49 + 40 = ?
Subscribe to this entry?

 [2003-11-30 06:13 UTC] hdf at vipmail dot hu
It is possible (very easily) to scan the whole filesystem structure of the server, on wich the php script is running, including all partitiones and drives.
The problem is I think that there is no limiting option in php, about how many levels upwards in the directory tree are alowed for a script.
I have made a little "Troyan horse php script", wich can scan the filesystem of the server, and even read in the textfiles on it.

Reproduce code:

Expected result:
It runs perfectly, but it shouldn't. :)

Actual result:
The whole server filesystem is visible and browsable and textfiles in it are readeable. Serious security hole!


Add a Patch

Pull Requests

Add a Pull Request


AllCommentsChangesGit/SVN commitsRelated reports
 [2003-11-30 07:31 UTC]
Thank you for taking the time to write to us, but this is not
a bug. Please double-check the documentation available at and the instructions on how to report
a bug at

It\'s not PHP\'s job to secure a webserver. And we have an \'open_basedir\' setting for this.
PHP Copyright © 2001-2022 The PHP Group
All rights reserved.
Last updated: Mon Aug 15 04:05:45 2022 UTC