![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
CVE ID: | CVE-2016-10712 |
Description: | In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker. |
Test IDs: | 1.3.6.1.4.1.25623.1.0.812512 1.3.6.1.4.1.25623.1.0.812513 1.3.6.1.4.1.25623.1.0.851710 1.3.6.1.4.1.25623.1.1.4.2018.0530.1 |
Cross References: |
Common Vulnerability Exposure (CVE) ID: CVE-2016-10712 https://usn.ubuntu.com/3566-2/ https://usn.ubuntu.com/3600-1/ |