CVE Vulnerabilities

CVE-2020-7062

NULL Pointer Dereference

Published: Feb 27, 2020 | Modified: Nov 21, 2024
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW
root.io logo minimus.io logo echo.ai logo

In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.

Weakness

The product dereferences a pointer that it expects to be valid but is NULL.

Affected Software

NameVendorStart VersionEnd Version
PhpPhp7.2.0 (including)7.2.27 (including)
PhpPhp7.3.0 (including)7.3.14 (including)
PhpPhp7.4.0 (including)7.4.2 (including)
Red Hat Enterprise Linux 8RedHatphp:7.3-8020020200715124551.ceb1cf90*
Red Hat Software Collections for Red Hat Enterprise Linux 7RedHatrh-php73-php-0:7.3.20-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUSRedHatrh-php73-php-0:7.3.20-1.el7*
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUSRedHatrh-php73-php-0:7.3.20-1.el7*
Php5Ubuntuesm-infra-legacy/trusty*
Php5Ubuntutrusty*
Php5Ubuntutrusty/esm*
Php7.0Ubuntuesm-infra/xenial*
Php7.0Ubuntuxenial*
Php7.2Ubuntubionic*
Php7.2Ubuntuesm-infra/bionic*
Php7.3Ubuntueoan*
Php7.3Ubuntuupstream*
Php7.4Ubuntutrusty*
Php7.4Ubuntuupstream*

Potential Mitigations

References