CVE Vulnerabilities

CVE-2020-7062

NULL Pointer Dereference

Published: Feb 27, 2020 | Modified: Jan 01, 2022
CVSS 3.x
7.5
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS 2.x
4.3 MEDIUM
AV:N/AC:M/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
7.5 MODERATE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Ubuntu
LOW

In PHP versions 7.2.x below 7.2.28, 7.3.x below 7.3.15 and 7.4.x below 7.4.3, when using file upload functionality, if upload progress tracking is enabled, but session.upload_progress.cleanup is set to 0 (disabled), and the file upload fails, the upload procedure would try to clean up data that does not exist and encounter null pointer dereference, which would likely lead to a crash.

Weakness

A NULL pointer dereference occurs when the application dereferences a pointer that it expects to be valid, but is NULL, typically causing a crash or exit.

Affected Software

Name Vendor Start Version End Version
Php Php 7.2.0 (including) 7.2.27 (including)
Php Php 7.3.0 (including) 7.3.14 (including)
Php Php 7.4.0 (including) 7.4.2 (including)
Red Hat Enterprise Linux 8 RedHat php:7.3-8020020200715124551.ceb1cf90 *
Red Hat Software Collections for Red Hat Enterprise Linux 7 RedHat rh-php73-php-0:7.3.20-1.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.6 EUS RedHat rh-php73-php-0:7.3.20-1.el7 *
Red Hat Software Collections for Red Hat Enterprise Linux 7.7 EUS RedHat rh-php73-php-0:7.3.20-1.el7 *
Php5 Ubuntu trusty *
Php5 Ubuntu trusty/esm *
Php7.0 Ubuntu xenial *
Php7.2 Ubuntu bionic *
Php7.3 Ubuntu eoan *
Php7.3 Ubuntu upstream *
Php7.4 Ubuntu trusty *
Php7.4 Ubuntu upstream *

Potential Mitigations

References