In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
CPE | Name | Operator | Version |
---|---|---|---|
ubuntu_linux | eq | 18.04 | |
ubuntu_linux | eq | 19.04 | |
ubuntu_linux | eq | 14.04 | |
ubuntu_linux | eq | 19.10 | |
ubuntu_linux | eq | 16.04 | |
ubuntu_linux | eq | 12.04 | |
debian_linux | eq | 8.0 | |
debian_linux | eq | 9.0 | |
debian_linux | eq | 10.0 | |
fedora | eq | 30 |
lists.opensuse.org/opensuse-security-announce/2020-01/msg00036.html
bugs.php.net/bug.php?id=78863
lists.debian.org/debian-lts-announce/2019/12/msg00034.html
lists.fedoraproject.org/archives/list/[email protected]/message/N7GCOAE6KVHYJ3UQ4KLPLTGSLX6IRVRN/
lists.fedoraproject.org/archives/list/[email protected]/message/XWRQPYXVG43Q7DXMXH6UVWMKWGUW552F/
seclists.org/bugtraq/2020/Feb/27
seclists.org/bugtraq/2020/Feb/31
seclists.org/bugtraq/2021/Jan/3
security.netapp.com/advisory/ntap-20200103-0002/
usn.ubuntu.com/4239-1/
www.debian.org/security/2020/dsa-4626
www.debian.org/security/2020/dsa-4628
www.tenable.com/security/tns-2021-14