Re: PHP fopen() CRLF Injection

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



This issue has now been fixed in their CVS repository. This is the
patch that they used:

http://cvs.php.net/diff.php/php4/ext/standard/url.c?r1=1.51&r2=1.52&ty=u&Horde=0

// Ulf Harnhammar
ulfh@update.uu.se
http://www.metaur.nu/


On Mon, 9 Sep 2002, Ulf Harnhammar wrote:

> PHP fopen() CRLF Injection
> 
> 
> SUMMARY:
> 
> fopen(), file() and other functions in PHP have a vulnerability
> that makes it possible to add extra HTTP headers to HTTP
> queries. Attackers may use it to escape certain restrictions,
> like what host to access on a web server. In some cases, this
> vulnerability even opens up for arbitrary net connections, turning
> some PHP scripts into proxies and open mail relays.


[Index of Archives]     [Linux Security]     [Netfilter]     [PHP]     [Yosemite News]     [Linux Kernel]

  Powered by Linux