Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2020-7066

Published: 1 April 2020

In PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16 and 7.4.x below 7.4.4, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.

Notes

AuthorNote
sbeattie
PEAR issues should go against php-pear as of xenial
leosilva
php5 in precise is 5.3 and does not support the Zend API
needed to fix this issue. Since backport this is to
intrusive, marking it as ignored for precise/esm.

Priority

Medium

Cvss 3 Severity Score

4.3

Score breakdown

Status

Package Release Status
php5
Launchpad, Ubuntu, Debian
bionic Does not exist

eoan Does not exist

focal Does not exist

trusty
Released (5.5.9+dfsg-1ubuntu4.29+esm11)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream Needs triage

xenial Does not exist

Patches:
upstream: https://github.com/microsoft/php-src/commit/c3582855b88cfde8e69734da738803b54c2c2e26
php7.0
Launchpad, Ubuntu, Debian
bionic Does not exist

eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Needs triage

xenial
Released (7.0.33-0ubuntu0.16.04.14)
php7.2
Launchpad, Ubuntu, Debian
bionic
Released (7.2.24-0ubuntu0.18.04.4)
eoan Does not exist

focal Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

php7.3
Launchpad, Ubuntu, Debian
bionic Does not exist

eoan
Released (7.3.11-0ubuntu0.19.10.4)
focal Does not exist

trusty Does not exist

upstream Needs triage

xenial Does not exist

php7.4
Launchpad, Ubuntu, Debian
bionic Does not exist

eoan Does not exist

focal
Released (7.4.3-4ubuntu1.1)
trusty Does not exist

upstream
Released (7.4.4)
xenial Does not exist

Severity score breakdown

Parameter Value
Base score 4.3
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Unchanged
Confidentiality Low
Integrity impact None
Availability impact None
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N