Lucene search

K
cve[email protected]CVE-2012-4388
HistorySep 07, 2012 - 10:55 p.m.

CVE-2012-4388

2012-09-0722:55:02
CWE-20
web.nvd.nist.gov
38
php
remote code execution
sapi.c
cve-2012-4388
http response splitting
internet explorer
google chrome
nvd

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.3

Confidence

Low

EPSS

0.014

Percentile

86.6%

The sapi_header_op function in main/SAPI.c in PHP 5.4.0RC2 through 5.4.0 does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1398.

Affected configurations

NVD
Node
phpphpRange5.3.05.3.11
OR
phpphpMatch5.4.0rc2
Node
canonicalubuntu_linuxMatch8.04-
OR
canonicalubuntu_linuxMatch10.04-
OR
canonicalubuntu_linuxMatch11.04
OR
canonicalubuntu_linuxMatch11.10
OR
canonicalubuntu_linuxMatch12.04-
Node
debiandebian_linuxMatch6.0
VendorProductVersionCPE
phpphp5.4.0cpe:/a:php:php:5.4.0:rc2::

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.3

Confidence

Low

EPSS

0.014

Percentile

86.6%