{ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2016-10397", "STATE" : "PUBLIC" }, "affects" : { "vendor" : { "vendor_data" : [ { "product" : { "product_data" : [ { "product_name" : "n/a", "version" : { "version_data" : [ { "version_value" : "n/a" } ] } } ] }, "vendor_name" : "n/a" } ] } }, "data_format" : "MITRE", "data_type" : "CVE", "data_version" : "4.0", "description" : { "description_data" : [ { "lang" : "eng", "value" : "In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c)." } ] }, "problemtype" : { "problemtype_data" : [ { "description" : [ { "lang" : "eng", "value" : "n/a" } ] } ] }, "references" : { "reference_data" : [ { "name" : "http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4", "refsource" : "CONFIRM", "url" : "http://git.php.net/?p=php-src.git;a=commit;h=b061fa909de77085d3822a89ab901b934d0362c4" }, { "name" : "http://openwall.com/lists/oss-security/2017/07/10/6", "refsource" : "CONFIRM", "url" : "http://openwall.com/lists/oss-security/2017/07/10/6" }, { "name" : "http://php.net/ChangeLog-5.php", "refsource" : "CONFIRM", "url" : "http://php.net/ChangeLog-5.php" }, { "name" : "http://php.net/ChangeLog-7.php", "refsource" : "CONFIRM", "url" : "http://php.net/ChangeLog-7.php" }, { "name" : "https://bugs.php.net/bug.php?id=73192", "refsource" : "CONFIRM", "url" : "https://bugs.php.net/bug.php?id=73192" }, { "name" : "https://security.netapp.com/advisory/ntap-20180112-0001/", "refsource" : "CONFIRM", "url" : "https://security.netapp.com/advisory/ntap-20180112-0001/" }, { "name" : "99552", "refsource" : "BID", "url" : "http://www.securityfocus.com/bid/99552" } ] } }