SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   PHP Vendors:   PHP Group
PHP HTTP Response Splitting Header Injection Protection Can Be Bypassed Using Carriage Return Characters
SecurityTracker Alert ID:  1027463
SecurityTracker URL:  http://securitytracker.com/id/1027463
CVE Reference:   CVE-2011-1398, CVE-2012-4388   (Links to External Site)
Updated:  Sep 6 2012
Original Entry Date:  Aug 31 2012
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): prior to 5.3.11
Description:   A vulnerability was reported in PHP. A remote user can bypass HTTP response splitting protections.

A remote user can submit specially crafted data containing carriage return characters to potentially cause the target server to return a split response. A remote user may be able to exploit this to spoof content on the target server, attempt to poison any intermediate web caches, or conduct cross-site scripting attacks.

Impact:   A remote user can create a URL that, when loaded by the target user, will cause arbitrary content to be displayed.

A remote user may be able to poison any intermediate web caches with arbitrary content.

Solution:   The vendor originally issued a fix (5.3.11, 5.4.0RC2) for CVE-2011-1398. The fix in 5.4.0RC2 was incomplete. The incomplete fix was assigned CVE-2012-4388.
Vendor URL:  www.php.net/ (Links to External Site)
Cause:   Input validation error
Underlying OS:   Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Feb 22 2013 (Red Hat Issues Fix) PHP HTTP Response Splitting Header Injection Protection Can Be Bypassed Using Carriage Return Characters   (bugzilla@redhat.com)
Red Hat has issued a fix for Red Hat Enterprise Linux 6.
Oct 1 2013 (Red Hat Issues Fix) PHP HTTP Response Splitting Header Injection Protection Can Be Bypassed Using Carriage Return Characters   (bugzilla@redhat.com)
Red Hat has issued a fix for Red Hat Enterprise Linux 5.



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC