First published: Tue Mar 17 2020(Updated: )
A vulnerability was found in PHP versions 7.2.x below 7.2.9, 7.3.x below 7.3.16 and 7.4.x below 7.4.34, while using get_headers() with user-supplied URL, if the URL contains zero (\0) character, the URL will be silently truncated at it. This may cause some software to make incorrect assumptions about the target of the get_headers() and possibly send some information to a wrong server.
Credit: security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/rh-php73-php | <0:7.3.20-1.el7 | 0:7.3.20-1.el7 |
PHP PHP | >=7.2.0<7.2.29 | |
PHP PHP | >=7.3.0<7.3.16 | |
PHP PHP | >=7.4.0<7.4.4 | |
Tenable Tenable.sc | <5.19.0 | |
Tenable Tenable.sc | =5.19.0 | |
openSUSE Leap | =15.1 | |
Debian Debian Linux | =8.0 | |
Debian Debian Linux | =9.0 | |
Debian Debian Linux | =10.0 | |
PHP PHP | <7.2.29 | 7.2.29 |
redhat/php | <7.2.29 | 7.2.29 |
redhat/php | <7.3.16 | 7.3.16 |
redhat/php | <7.4.4 | 7.4.4 |
debian/php7.4 | 7.4.33-1+deb11u5 7.4.33-1+deb11u7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7066 is a vulnerability in PHP versions 7.2.x, 7.3.x, and 7.4.x that allows an attacker to truncate URLs containing null bytes when using the get_headers() function.
CVE-2020-7066 has a severity rating of 4.3 (medium).
CVE-2020-7066 affects PHP versions 7.2.x below 7.2.29, 7.3.x below 7.3.16, and 7.4.x below 7.4.4.
The impact of CVE-2020-7066 is that certain software may make incorrect assumptions about the target of the get_headers() function when the URL is truncated.
To fix CVE-2020-7066, you should update PHP to version 7.2.29, 7.3.16, or 7.4.4 depending on the version you are currently using.