Lucene search

K
cve[email protected]CVE-2011-1398
HistoryAug 30, 2012 - 10:55 p.m.

CVE-2011-1398

2012-08-3022:55:02
CWE-20
web.nvd.nist.gov
106
cve-2011-1398
php
sapi.c
http
response-splitting
security vulnerability

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.3

Confidence

Low

EPSS

0.014

Percentile

86.6%

The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.

Affected configurations

NVD
Node
phpphpRange5.3.10
OR
phpphpMatch5.3.0
OR
phpphpMatch5.3.1
OR
phpphpMatch5.3.2
OR
phpphpMatch5.3.3
OR
phpphpMatch5.3.4
OR
phpphpMatch5.3.5
OR
phpphpMatch5.3.6
OR
phpphpMatch5.3.7
OR
phpphpMatch5.3.8
OR
phpphpMatch5.3.9
VendorProductVersionCPE
phpphp5.3.1cpe:/a:php:php:5.3.1:::
phpphpcpe:/a:php:php::::
phpphp5.3.5cpe:/a:php:php:5.3.5:::
phpphp5.3.6cpe:/a:php:php:5.3.6:::
phpphp5.3.7cpe:/a:php:php:5.3.7:::
phpphp5.3.4cpe:/a:php:php:5.3.4:::
phpphp5.3.9cpe:/a:php:php:5.3.9:::
phpphp5.3.8cpe:/a:php:php:5.3.8:::
phpphp5.3.2cpe:/a:php:php:5.3.2:::
phpphp5.3.0cpe:/a:php:php:5.3.0:::
Rows per page:
1-10 of 111

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.3

Confidence

Low

EPSS

0.014

Percentile

86.6%