First published: Mon Feb 08 2016(Updated: )
In PHP before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3, all of the return values of stream_get_meta_data can be controlled if the input can be controlled (e.g., during file uploads). For example, a "$uri = stream_get_meta_data(fopen($file, "r"))['uri']" call mishandles the case where $file is data:text/plain;uri=eviluri, -- in other words, metadata can be set by an attacker.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/php5 | ||
debian/php5.6 | ||
debian/php7.0 | ||
redhat/php | <5.6.18 | 5.6.18 |
redhat/php | <5.5.32 | 5.5.32 |
PHP | <=5.5.31 | |
PHP | >=5.6.0<=5.6.17 | |
PHP | >=7.0.0<=7.0.2 | |
Ubuntu | =14.04 | |
Ubuntu | =16.04 | |
Ubuntu | =17.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-10712 is high (7.5).
CVE-2016-10712 affects PHP versions before 5.5.32, 5.6.x before 5.6.18, and 7.x before 7.0.3.
The impact of CVE-2016-10712 is that all return values of stream_get_meta_data can be controlled if the input can be controlled.
There are no available remedies for CVE-2016-10712 according to the provided information.
You can find more information about CVE-2016-10712 at the following references: [1](https://bugs.php.net/bug.php?id=71323), [2](https://git.php.net/?p=php-src.git;a=commit;h=6297a117d77fa3a0df2e21ca926a92c231819cd5), [3](https://usn.ubuntu.com/3600-1/).