{"id":"BIT-php-2020-7068","summary":"Use of freed hash key in the phar_parse_zipfile function","details":"In PHP versions 7.2.x below 7.2.33, 7.3.x below 7.3.21 and 7.4.x below 7.4.9, while processing PHAR files using phar extension, phar_parse_zipfile could be tricked into accessing freed memory, which could lead to a crash or information disclosure.","aliases":["BIT-libphp-2020-7068","BIT-php-min-2020-7068","CVE-2020-7068"],"modified":"2025-08-11T14:44:35.338483Z","published":"2024-03-06T11:06:18.071Z","database_specific":{"cpes":["cpe:2.3:a:php:php:*:*:*:*:*:*:*:*"],"severity":"Low"},"references":[{"type":"WEB","url":"https://bugs.php.net/bug.php?id=79797"},{"type":"WEB","url":"https://security.gentoo.org/glsa/202009-10"},{"type":"WEB","url":"https://security.netapp.com/advisory/ntap-20200918-0005/"},{"type":"WEB","url":"https://www.debian.org/security/2021/dsa-4856"},{"type":"WEB","url":"https://www.tenable.com/security/tns-2021-14"},{"type":"WEB","url":"https://nvd.nist.gov/vuln/detail/CVE-2020-7068"}],"affected":[{"package":{"name":"php","ecosystem":"Bitnami","purl":"pkg:bitnami/php"},"ranges":[{"type":"SEMVER","events":[{"introduced":"7.2.0"},{"fixed":"7.2.33"},{"introduced":"7.3.0"},{"fixed":"7.3.21"},{"introduced":"7.4.0"},{"fixed":"7.4.9"}]}],"database_specific":{"source":"https://github.com/bitnami/vulndb/tree/main/data/php/BIT-php-2020-7068.json"},"severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:L"}]}],"schema_version":"1.7.3"}