First published: Mon Mar 27 2017(Updated: )
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=7.1.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-7272 is considered a medium severity vulnerability due to its potential for Server-Side Request Forgery (SSRF).
To fix CVE-2017-7272, upgrade your PHP version to 7.1.12 or later to mitigate the vulnerability.
Applications that utilize fsockopen or pfsockopen with untrusted hostname arguments are at risk due to CVE-2017-7272.
The impact of CVE-2017-7272 allows an attacker to send requests to internal services or untrusted locations, leading to potential data exposure.
PHP versions up to 7.1.11 are vulnerable to CVE-2017-7272, making them susceptible to SSRF attacks.