In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.
References
Link | Resource |
---|---|
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html | Mailing List Third Party Advisory |
https://bugs.php.net/bug.php?id=79221 | Exploit Vendor Advisory |
https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html | Mailing List Third Party Advisory |
https://security.gentoo.org/glsa/202003-57 | Third Party Advisory |
https://usn.ubuntu.com/4330-1/ | Third Party Advisory |
https://www.debian.org/security/2020/dsa-4717 | Third Party Advisory |
https://www.debian.org/security/2020/dsa-4719 | Third Party Advisory |
https://www.tenable.com/security/tns-2021-14 | Third Party Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
History
01 Jan 2022, 19:30
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | (DEBIAN) https://www.debian.org/security/2020/dsa-4717 - Third Party Advisory | |
References | (MLIST) https://lists.debian.org/debian-lts-announce/2020/03/msg00034.html - Mailing List, Third Party Advisory | |
References | (DEBIAN) https://www.debian.org/security/2020/dsa-4719 - Third Party Advisory | |
References | (SUSE) http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00023.html - Mailing List, Third Party Advisory | |
References | (UBUNTU) https://usn.ubuntu.com/4330-1/ - Third Party Advisory | |
References | (GENTOO) https://security.gentoo.org/glsa/202003-57 - Third Party Advisory | |
CPE | cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:-:*:*:* cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:esm:*:*:* cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:19.10:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:18.04:*:*:*:lts:*:*:* cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:* cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:* cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:* |
Information
Published : 2020-02-27 21:15
Updated : 2024-02-04 20:39
NVD link : CVE-2020-7062
Mitre link : CVE-2020-7062
CVE.ORG link : CVE-2020-7062
JSON object : View
Products Affected
debian
- debian_linux
canonical
- ubuntu_linux
php
- php
opensuse
- leap
CWE
CWE-476
NULL Pointer Dereference