7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.005 Low
EPSS
Percentile
76.3%
In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various
URI components in the URL parser could be used by attackers to bypass
hostname-specific URL checks, as demonstrated by
evil.example.com:80#@good.example.com/ and
evil.example.com:[email protected]/ inputs to the parse_url function
(implemented in the php_url_parse_ex function in ext/standard/url.c).
Author | Note |
---|---|
sbeattie | PEAR issues should go against php-pear as of xenial |
openwall.com/lists/oss-security/2017/07/10/6
php.net/ChangeLog-5.php
php.net/ChangeLog-7.php
launchpad.net/bugs/cve/CVE-2016-10397
nvd.nist.gov/vuln/detail/CVE-2016-10397
security-tracker.debian.org/tracker/CVE-2016-10397
ubuntu.com/security/notices/USN-3382-1
ubuntu.com/security/notices/USN-3382-2
www.cve.org/CVERecord?id=CVE-2016-10397
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.005 Low
EPSS
Percentile
76.3%