Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2017-7272

Published: 27 March 2017

PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.

Notes

AuthorNote
mdeslaur
the change in behaviour broke applications relying on
undocumented behaviour so was reverted in subsequent releases
We will not be fixing this in stable releases. Marking as ignored.

Priority

Low

Cvss 3 Severity Score

7.4

Score breakdown

Status

Package Release Status
php5
Launchpad, Ubuntu, Debian
precise Ignored
(end of life)
trusty Ignored

upstream Needs triage

xenial Does not exist

yakkety Does not exist

zesty Does not exist

php7.0
Launchpad, Ubuntu, Debian
precise Does not exist

trusty Does not exist

upstream
Released (7.0.18)
xenial Ignored

yakkety Ignored
(end of life)
zesty Ignored

Patches:
upstream: https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
php7.1
Launchpad, Ubuntu, Debian
precise Does not exist

trusty Does not exist

upstream
Released (7.1.4)
xenial Does not exist

yakkety Does not exist

zesty Does not exist

Severity score breakdown

Parameter Value
Base score 7.4
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Changed
Confidentiality None
Integrity impact High
Availability impact None
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:H/A:N