CVE-2017-7272
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
PHP hasta la versión 7.1.11 podría permitir SSRF en aplicaciones que aceptan un argumento de nombre de host fsockopen o pfsockopen con la expectativa de que el número de puerto esté limitado. Debido a que se reconoce una sintaxis :port, fsockopen empleará el número de puerto especificado en el argumento del nombre de host en lugar del número de puerto en el segundo argumento de la función.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-03-27 CVE Reserved
- 2017-03-27 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-918: Server-Side Request Forgery (SSRF)
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/97178 | Third Party Advisory | |
http://www.securitytracker.com/id/1038158 | Vdb Entry | |
https://bugs.php.net/bug.php?id=75505 | X_refsource_confirm | |
https://security.netapp.com/advisory/ntap-20180112-0001 | X_refsource_confirm | |
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170403-0_PHP_Misbehavior_of_fsockopen_function_v10.txt | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a | 2018-02-26 |
URL | Date | SRC |
---|---|---|
https://bugs.php.net/bug.php?id=74216 | 2018-02-26 |