cve/2020/CVE-2020-7059.md

23 lines
1.0 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2020-7059](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-7059)
![](https://img.shields.io/static/v1?label=Product&message=PHP&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=7.2.x%3C%207.2.27%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-125%20Out-of-bounds%20Read&color=brighgreen)
### Description
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
### POC
#### Reference
- https://hackerone.com/reports/778834
2024-06-09 00:33:16 +00:00
- https://hackerone.com/reports/778834
2024-05-25 21:48:12 +02:00
- https://www.oracle.com/security-alerts/cpuApr2021.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpuApr2021.html
2024-05-25 21:48:12 +02:00
- https://www.oracle.com/security-alerts/cpujul2020.html
2024-06-09 00:33:16 +00:00
- https://www.oracle.com/security-alerts/cpujul2020.html
2024-05-25 21:48:12 +02:00
#### Github
No PoCs found on GitHub currently.