CVE Vulnerabilities

CVE-2017-5630

Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')

Published: Feb 01, 2017 | Modified: Jan 23, 2020
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
CVSS 2.x
5 MEDIUM
AV:N/AC:L/Au:N/C:N/I:P/A:N
RedHat/V2
RedHat/V3
3.4 MODERATE
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:L/A:N
Ubuntu
NEGLIGIBLE

PECL in the download utility class in the Installer in PEAR Base System v1.10.1 does not validate file types and filenames after a redirect, which allows remote HTTP servers to overwrite files via crafted responses, as demonstrated by a .htaccess overwrite.

Weakness

The product constructs all or part of a command, data structure, or record using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify how it is parsed or interpreted when it is sent to a downstream component.

Affected Software

Name Vendor Start Version End Version
Pear Php 1.10.1 (including) 1.10.1 (including)
Php-pear Ubuntu artful *
Php-pear Ubuntu bionic *
Php-pear Ubuntu cosmic *
Php-pear Ubuntu disco *
Php-pear Ubuntu eoan *
Php-pear Ubuntu groovy *
Php-pear Ubuntu hirsute *
Php-pear Ubuntu impish *
Php-pear Ubuntu kinetic *
Php-pear Ubuntu lunar *
Php-pear Ubuntu mantic *
Php-pear Ubuntu upstream *
Php-pear Ubuntu xenial *
Php-pear Ubuntu yakkety *
Php-pear Ubuntu zesty *
Php5 Ubuntu precise *
Php5 Ubuntu precise/esm *
Php5 Ubuntu trusty *
Php5 Ubuntu trusty/esm *
Php5 Ubuntu upstream *

Potential Mitigations

References