Описание
In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.
Релиз | Статус | Примечание |
---|---|---|
artful | DNE | |
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
esm-infra-legacy/trusty | not-affected | 5.5.9+dfsg-1ubuntu4.24 |
precise/esm | not-affected | 5.3.10-1ubuntu3.36 |
trusty | released | 5.5.9+dfsg-1ubuntu4.24 |
trusty/esm | not-affected | 5.5.9+dfsg-1ubuntu4.24 |
upstream | released | 5.5.32,5.6.18 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
artful | DNE | |
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
esm-infra-legacy/trusty | DNE | |
esm-infra/xenial | not-affected | 7.0.25-0ubuntu0.16.04.1 |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
artful | not-affected | 7.1.11-0ubuntu0.17.10.1 |
bionic | DNE | |
cosmic | DNE | |
devel | DNE | |
disco | DNE | |
esm-infra-legacy/trusty | DNE | |
precise/esm | DNE | |
trusty | DNE | |
trusty/esm | DNE | |
upstream | needs-triage |
Показывать по
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.
In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.
In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all o ...
EPSS
5 Medium
CVSS2
7.5 High
CVSS3