CVE-2017-20157: Ariadne Component Library vulnerable to Server-Side Request Forgery
9.8
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.1685%
CWE
Published
12/31/2022
Updated
2/2/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| arc/web | composer | < 3.0 | 3.0 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The commit diff shows critical validation was added to the Url constructor to prevent SSRF. The patch specifically addresses cases where parse_url() returns a host containing colons (which could indicate port smuggling) by truncating at the first colon. The added test cases demonstrate exploitation scenarios like 'http://127.0.0.1:11211:80/' where the vulnerable version would incorrectly parse the host/port combination. The __construct method's pre-patch handling of URL components without this validation directly enabled SSRF vectors.