A security flaw was found in the way PHP performed soap.wsdl_cache_dir configuration directive validation before projecting SOAP WSDL cache content to the local filesystem. A remote attacker could use this flaw to place SOAP WSDL files at arbitrary file system locations (locations accessible with the privileges of the PHP application).
Relevant upstream patch:
PHP NEWS file entries:
Note that this is actually an open_basedir bypass issue.
The problem is that soap.wsdl_cache_dir does not consult the open_basedir directive to determine where it is allowed to write files.
*** This bug has been marked as a duplicate of bug 169857 ***
We do not consider safe_mode / open_basedir restriction bypass issues to be security sensitive. For more details see http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=169857#c1 and http://www.php.net/security-note.php