CVE-2019-11044
Published: 23 December 2019
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
Notes
Author | Note |
---|---|
mdeslaur | windows-specific issue |
Priority
Status
Package | Release | Status |
---|---|---|
php5 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
disco |
Does not exist
|
|
eoan |
Does not exist
|
|
trusty |
Not vulnerable
(code not compiled)
|
|
upstream |
Not vulnerable
(debian: Windows specific issue)
|
|
xenial |
Does not exist
|
|
php7.0 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
disco |
Does not exist
|
|
eoan |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Not vulnerable
(debian: Windows specific issue)
|
|
xenial |
Not vulnerable
(code not compiled)
|
|
php7.2 Launchpad, Ubuntu, Debian |
bionic |
Not vulnerable
(code not compiled)
|
disco |
Not vulnerable
(code not compiled)
|
|
eoan |
Does not exist
|
|
trusty |
Does not exist
|
|
upstream |
Needs triage
|
|
xenial |
Does not exist
|
|
php7.3 Launchpad, Ubuntu, Debian |
bionic |
Does not exist
|
disco |
Does not exist
|
|
eoan |
Not vulnerable
(code not compiled)
|
|
trusty |
Does not exist
|
|
upstream |
Not vulnerable
(debian: Windows specific issue)
|
|
xenial |
Does not exist
|
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.5 |
Attack vector | Network |
Attack complexity | Low |
Privileges required | None |
User interaction | None |
Scope | Unchanged |
Confidentiality | High |
Integrity impact | None |
Availability impact | None |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |