vulnerability
Oracle Solaris 11: CVE-2016-10397: Vulnerability in PHP
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Jul 10, 2017 | Apr 18, 2018 | Feb 1, 2022 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Jul 10, 2017
Added
Apr 18, 2018
Modified
Feb 1, 2022
Description
In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).
Solution(s)
oracle-solaris-11-3-upgrade-web-php-56-5-6-34-0-175-3-31-0-2-0oracle-solaris-11-3-upgrade-web-php-71-7-1-15-0-175-3-31-0-2-0

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.