ALT-PU-2017-1548-1
Package php7-openssl updated to version 7.1.4-alt1.M80P.1.1 for branch p8 in task 182199.
Closed vulnerabilities
Published: 2017-03-27
BDU:2023-01643
Уязвимость языка программирования PHP, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Severity: MEDIUM (6.1)
Vector: AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:N
References:
Published: 2017-03-27
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2017-7272
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
Severity: HIGH (7.4)
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N
References:
- 97178
- 97178
- 1038158
- 1038158
- https://bugs.php.net/bug.php?id=74216
- https://bugs.php.net/bug.php?id=74216
- https://bugs.php.net/bug.php?id=75505
- https://bugs.php.net/bug.php?id=75505
- https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
- https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170403-0_PHP_Misbehavior_of_fsockopen_function_v10.txt
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170403-0_PHP_Misbehavior_of_fsockopen_function_v10.txt