Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-1220

Опубликовано: 13 июл. 2025
Источник: debian

Описание

In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php8.4fixed8.4.10-1package
php8.2removedpackage
php7.4removedpackage

Примечания

  • https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r

  • Fixed by: https://github.com/php/php-src/commit/cac8f7f1cf4939f55f06b68120040f057682d89c (php-8.1.33)

Связанные уязвимости

CVSS3: 3.7
ubuntu
24 дня назад

[Null byte termination in hostnames]

CVSS3: 3.7
redhat
21 день назад

No description is available for this CVE.

CVSS3: 3.7
nvd
20 дней назад

In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions.

github
около 1 месяца назад

Null byte termination in hostnames