VYPR
High severity7.5NVD Advisory· Published Jul 10, 2017· Updated May 13, 2026

CVE-2016-10397

CVE-2016-10397

Description

In PHP before 5.6.28 and 7.x before 7.0.13, incorrect handling of various URI components in the URL parser could be used by attackers to bypass hostname-specific URL checks, as demonstrated by evil.example.com:80#@good.example.com/ and evil.example.com:80?@good.example.com/ inputs to the parse_url function (implemented in the php_url_parse_ex function in ext/standard/url.c).

Affected products

14
  • PHP/PHP14 versions
    cpe:2.3:a:php:php:*:*:*:*:*:*:*:*+ 13 more
    • cpe:2.3:a:php:php:*:*:*:*:*:*:*:*range: <=5.6.27
    • cpe:2.3:a:php:php:7.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.10:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.11:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.12:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.6:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.7:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.8:*:*:*:*:*:*:*
    • cpe:2.3:a:php:php:7.0.9:*:*:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

7

News mentions

0

No linked articles in our index yet.