CVE-2016-10397
moderate-risk
Published 2017-07-10
In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).
Do I need to act?
-
0.40% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Vendors
References (14)
Mailing List
http://openwall.com/lists/oss-security/2017/07/10/6
Release Notes
http://php.net/ChangeLog-5.php
Release Notes
http://php.net/ChangeLog-7.php
Issue Tracking
https://bugs.php.net/bug.php?id=73192
Mailing List
http://openwall.com/lists/oss-security/2017/07/10/6
Release Notes
http://php.net/ChangeLog-5.php
Release Notes
http://php.net/ChangeLog-7.php
Issue Tracking
https://bugs.php.net/bug.php?id=73192
46
/ 100
moderate-risk
Severity
26/34 · High
Exploitability
2/34 · Minimal
Exposure
18/34 · Moderate