MEDIUM · 6.5

CVE-2020-7059

When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function ...

Vulnerability Description

When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
LOW
Integrity
NONE
Availability
LOW

Affected Products

VendorProductVersions
PhpPhp>= 7.2.0, < 7.2.27
TenableTenable.Sc< 5.19.0
OracleCommunications Diameter Signaling Router>= 8.0, <= 8.4
OpensuseLeap15.1
DebianDebian Linux8.0

Related Weaknesses (CWE)

References

FAQ

What is CVE-2020-7059?

CVE-2020-7059 is a vulnerability with a CVSS score of 6.5 (MEDIUM). When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function ...

How severe is CVE-2020-7059?

CVE-2020-7059 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2020-7059?

Check the references section above for vendor advisories and patch information. Affected products include: Php Php, Tenable Tenable.Sc, Oracle Communications Diameter Signaling Router, Opensuse Leap, Debian Debian Linux.