Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2016-10712

Опубликовано: 09 фев. 2018
Источник: ubuntu
Приоритет: low
EPSS Низкий
CVSS2: 5
CVSS3: 7.5

Описание

In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

not-affected

5.5.9+dfsg-1ubuntu4.24
precise/esm

not-affected

5.3.10-1ubuntu3.36
trusty

released

5.5.9+dfsg-1ubuntu4.24
trusty/esm

not-affected

5.5.9+dfsg-1ubuntu4.24
upstream

released

5.5.32,5.6.18

Показывать по

РелизСтатусПримечание
artful

DNE

bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

esm-infra/xenial

not-affected

7.0.25-0ubuntu0.16.04.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
artful

not-affected

7.1.11-0ubuntu0.17.10.1
bionic

DNE

cosmic

DNE

devel

DNE

disco

DNE

esm-infra-legacy/trusty

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

Показывать по

EPSS

Процентиль: 57%
0.00357
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Связанные уязвимости

CVSS3: 3.7
redhat
больше 9 лет назад

In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.

CVSS3: 7.5
nvd
больше 7 лет назад

In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.

CVSS3: 7.5
debian
больше 7 лет назад

In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all o ...

suse-cvrf
больше 7 лет назад

Security update for php5

suse-cvrf
больше 7 лет назад

Security update for php5

EPSS

Процентиль: 57%
0.00357
Низкий

5 Medium

CVSS2

7.5 High

CVSS3

Уязвимость CVE-2016-10712