Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-7189

Опубликовано: 10 июл. 2019
Источник: debian
EPSS Низкий

Описание

main/streams/xp_socket.c in PHP 7.x before 2017-03-07 misparses fsockopen calls, such as by interpreting fsockopen('127.0.0.1:80', 443) as if the address/port were 127.0.0.1:80:443, which is later truncated to 127.0.0.1:80. This behavior has a security risk if the explicitly provided port number (i.e., 443 in this example) is hardcoded into an application as a security policy, but the hostname argument (i.e., 127.0.0.1:80 in this example) is obtained from untrusted input.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php7.3removedpackage
php7.3ignoredbusterpackage
php7.0removedpackage
php7.0ignoredstretchpackage
php5removedpackage
php5ignoredjessiepackage

Примечания

  • PHP Bug: https://bugs.php.net/bug.php?id=74192

  • https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a

  • The commit was later on reverted again because of breaking some features.

  • See as well the related CVE-2017-7272.

EPSS

Процентиль: 46%
0.00231
Низкий

Связанные уязвимости

CVSS3: 7.5
ubuntu
почти 6 лет назад

main/streams/xp_socket.c in PHP 7.x before 2017-03-07 misparses fsockopen calls, such as by interpreting fsockopen('127.0.0.1:80', 443) as if the address/port were 127.0.0.1:80:443, which is later truncated to 127.0.0.1:80. This behavior has a security risk if the explicitly provided port number (i.e., 443 in this example) is hardcoded into an application as a security policy, but the hostname argument (i.e., 127.0.0.1:80 in this example) is obtained from untrusted input.

CVSS3: 5.9
redhat
почти 6 лет назад

main/streams/xp_socket.c in PHP 7.x before 2017-03-07 misparses fsockopen calls, such as by interpreting fsockopen('127.0.0.1:80', 443) as if the address/port were 127.0.0.1:80:443, which is later truncated to 127.0.0.1:80. This behavior has a security risk if the explicitly provided port number (i.e., 443 in this example) is hardcoded into an application as a security policy, but the hostname argument (i.e., 127.0.0.1:80 in this example) is obtained from untrusted input.

CVSS3: 7.5
nvd
почти 6 лет назад

main/streams/xp_socket.c in PHP 7.x before 2017-03-07 misparses fsockopen calls, such as by interpreting fsockopen('127.0.0.1:80', 443) as if the address/port were 127.0.0.1:80:443, which is later truncated to 127.0.0.1:80. This behavior has a security risk if the explicitly provided port number (i.e., 443 in this example) is hardcoded into an application as a security policy, but the hostname argument (i.e., 127.0.0.1:80 in this example) is obtained from untrusted input.

CVSS3: 7.5
github
около 3 лет назад

main/streams/xp_socket.c in PHP 7.x before 2017-03-07 misparses fsockopen calls, such as by interpreting fsockopen('127.0.0.1:80', 443) as if the address/port were 127.0.0.1:80:443, which is later truncated to 127.0.0.1:80. This behavior has a security risk if the explicitly provided port number (i.e., 443 in this example) is hardcoded into an application as a security policy, but the hostname argument (i.e., 127.0.0.1:80 in this example) is obtained from untrusted input.

CVSS3: 7.5
fstec
больше 8 лет назад

Уязвимость компонента main/streams/xp_socket.c языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным

EPSS

Процентиль: 46%
0.00231
Низкий