Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2020-7059


When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.


Published

2020-02-10T08:15:12.673

Last Modified

2024-11-21T05:36:35.167

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 6.5 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:P

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: NONE
  • Availability Impact: PARTIAL
Exploitability Score

10.0

Impact Score

4.9

Weaknesses
  • Type: Secondary
    CWE-125
  • Type: Primary
    CWE-125

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application php php < 7.2.27 Yes
Application php php < 7.3.14 Yes
Application php php < 7.4.2 Yes
Application tenable tenable.sc < 5.19.0 Yes
Application oracle communications_diameter_signaling_router ≤ 8.4 Yes
Operating System opensuse leap 15.1 Yes
Operating System debian debian_linux 8.0 Yes

References