From: [EMAIL PROTECTED]
Operating system: Linux 2.4.18
PHP version: 4.2.0
PHP Bug Type: Scripting Engine problem
Bug description: fopen can bypass safe_mode
If a readfile() function is passed 3rd parameter, which normally indicated
that the file should be opened from the "include_path", it can by pass
safe_mode limitations.
ex.
<?php
fpassthru(fopen("/etc/passwd", "r", 1));
?>
--
Edit bug report at http://bugs.php.net/?id=17157&edit=1
--
Fixed in CVS: http://bugs.php.net/fix.php?id=17157&r=fixedcvs
Fixed in release: http://bugs.php.net/fix.php?id=17157&r=alreadyfixed
Need backtrace: http://bugs.php.net/fix.php?id=17157&r=needtrace
Try newer version: http://bugs.php.net/fix.php?id=17157&r=oldversion
Not developer issue: http://bugs.php.net/fix.php?id=17157&r=support
Expected behavior: http://bugs.php.net/fix.php?id=17157&r=notwrong
Not enough info: http://bugs.php.net/fix.php?id=17157&r=notenoughinfo
Submitted twice: http://bugs.php.net/fix.php?id=17157&r=submittedtwice
register_globals: http://bugs.php.net/fix.php?id=17157&r=globals