Name | CVE-2017-7272 |
Description | PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-875-1 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
php5 (PTS) | jessie, jessie (lts) | 5.6.40+dfsg-0+deb8u21 | vulnerable |
php7.0 (PTS) | stretch (security) | 7.0.33-0+deb9u12 | vulnerable |
| stretch (lts), stretch | 7.0.33-0+deb9u19 | vulnerable |
php7.3 (PTS) | buster, buster (lts) | 7.3.31-1~deb10u8 | vulnerable |
| buster (security) | 7.3.31-1~deb10u7 | vulnerable |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|
php5 | source | wheezy | 5.4.45-0+deb7u8 | | DLA-875-1 | |
php5 | source | (unstable) | (unfixed) | | | |
php7.0 | source | (unstable) | (unfixed) | | | |
php7.1 | source | (unstable) | (unfixed) | | | |
php7.3 | source | (unstable) | (unfixed) | | | |
Notes
[buster] - php7.3 <ignored> (Upstream patch breaks existing applications, was reverted again, revisit if a new approach has been identified)
[stretch] - php7.0 <ignored> (Upstream patch breaks existing applications, revisit if a new approach has been identified)
[jessie] - php5 <ignored> (Never applied to PHP 5 by upstream, breaks existing applications)
https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
https://bugs.php.net/bug.php?id=74216
Fixed in 7.1.4 and 7.0.18, but were later reverted: https://bugzilla.redhat.com/show_bug.cgi?id=1437837#c3