CVE-2016-10712 Information

Share on:

Description

In PHP before 5.5.32 5.6.x before 5.6.18 and 7.x before 7.0.3 all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g. during file uploads). For example a $uri = stream_get_meta_data(fopen($file \r))[‘uri’]\ call mishandles the case where $file is data:text/plain;uri=eviluri – in other words metadata can be set by an attacker.

CVSS Vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Reference

https://bugs.php.net/bug.php?id=71323 https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5 https://usn.ubuntu.com/3566-2/ https://usn.ubuntu.com/3600-1/

Attack Complexity

LOW

Privileges Required

NONE

User Interaction Required

NONE

Scope

NONE

Confidentiality Impact

UNCHANGED

Integrity Impact

NONE

Availability Impact

HIGH

Base Score

NONE

Base Severity

7.5