CVE-2011-1398
PHP 5.3.11/5.4.0RC2 - 'header()' HTTP Header Injection
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.
La función sapi_header_op en el archivo main/SAPI.c en PHP anterior a versión 5.3.11 y versiones 5.4.x anteriores a 5.4.0RC2, no comprueba si hay secuencias de %0D (también se conoce como caracteres de retorno de acarreo), lo que permite a atacantes remotos omitir un mecanismo de protección de división de respuesta HTTP por medio de una URL diseñada, relacionada con la interacción inapropiada entre la función de PHP header y ciertos navegadores, como es demostrado por Internet Explorer y Google Chrome.
PHP is an HTML-embedded scripting language commonly used with the Apache HTTP Server. It was found that PHP did not properly handle file names with a NULL character. A remote attacker could possibly use this flaw to make a PHP script access unexpected files and bypass intended file system access restrictions. It was found that PHP did not check for carriage returns in HTTP headers, allowing intended HTTP response splitting protections to be bypassed. Depending on the web browser the victim is using, a remote attacker could use this flaw to perform HTTP response splitting attacks.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-03-10 CVE Reserved
- 2011-10-06 First Exploit
- 2012-08-30 CVE Published
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-20: Improper Input Validation
CAPEC
References (13)
URL | Tag | Source |
---|---|---|
http://article.gmane.org/gmane.comp.php.devel/70584 | Mailing List | |
http://openwall.com/lists/oss-security/2012/08/29/5 | Mailing List | |
http://openwall.com/lists/oss-security/2012/09/05/15 | Mailing List | |
http://secunia.com/advisories/55078 | Third Party Advisory | |
http://security-tracker.debian.org/tracker/CVE-2011-1398 | X_refsource_confirm | |
http://www.securitytracker.com/id?1027463 | Vdb Entry | |
https://bugs.php.net/bug.php?id=60227 | X_refsource_misc |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/37688 | 2011-10-06 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.opensuse.org/opensuse-security-announce/2013-08/msg00006.html | 2013-10-11 | |
http://rhn.redhat.com/errata/RHSA-2013-1307.html | 2013-10-11 | |
http://www.ubuntu.com/usn/USN-1569-1 | 2013-10-11 | |
https://access.redhat.com/security/cve/CVE-2011-1398 | 2013-12-11 | |
https://bugzilla.redhat.com/show_bug.cgi?id=853329 | 2013-12-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | <= 5.3.10 Search vendor "Php" for product "Php" and version " <= 5.3.10" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.0 Search vendor "Php" for product "Php" and version "5.3.0" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.1 Search vendor "Php" for product "Php" and version "5.3.1" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.2 Search vendor "Php" for product "Php" and version "5.3.2" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.3 Search vendor "Php" for product "Php" and version "5.3.3" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.4 Search vendor "Php" for product "Php" and version "5.3.4" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.5 Search vendor "Php" for product "Php" and version "5.3.5" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.6 Search vendor "Php" for product "Php" and version "5.3.6" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.7 Search vendor "Php" for product "Php" and version "5.3.7" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.8 Search vendor "Php" for product "Php" and version "5.3.8" | - |
Affected
| ||||||
Php Search vendor "Php" | Php Search vendor "Php" for product "Php" | 5.3.9 Search vendor "Php" for product "Php" and version "5.3.9" | - |
Affected
|