Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2020-7066

Опубликовано: 01 апр. 2020
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 4.3
CVSS3: 5.3

Описание

In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

released

5.5.9+dfsg-1ubuntu4.29+esm11
esm-infra/focal

DNE

focal

DNE

precise/esm

ignored

trusty

ignored

end of standard support
trusty/esm

released

5.5.9+dfsg-1ubuntu4.29+esm11
upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

esm-infra/xenial

released

7.0.33-0ubuntu0.16.04.14
focal

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

released

7.2.24-0ubuntu0.18.04.4
devel

DNE

eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/bionic

released

7.2.24-0ubuntu0.18.04.4
esm-infra/focal

DNE

focal

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

DNE

eoan

released

7.3.11-0ubuntu0.19.10.4
esm-infra-legacy/trusty

DNE

esm-infra/focal

DNE

focal

DNE

precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

needs-triage

Показывать по

РелизСтатусПримечание
bionic

DNE

devel

released

7.4.3-4ubuntu2
eoan

DNE

esm-infra-legacy/trusty

DNE

esm-infra/focal

released

7.4.3-4ubuntu1.1
focal

released

7.4.3-4ubuntu1.1
precise/esm

DNE

trusty

DNE

trusty/esm

DNE

upstream

released

7.4.4

Показывать по

EPSS

Процентиль: 79%
0.01281
Низкий

4.3 Medium

CVSS2

5.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
redhat
больше 5 лет назад

In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.

CVSS3: 5.3
nvd
больше 5 лет назад

In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.

CVSS3: 5.3
debian
больше 5 лет назад

In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below ...

CVSS3: 4.3
github
больше 3 лет назад

In PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.

CVSS3: 4.3
fstec
больше 5 лет назад

Уязвимость реализации функции get_headers() интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации

EPSS

Процентиль: 79%
0.01281
Низкий

4.3 Medium

CVSS2

5.3 Medium

CVSS3