First published: Thu Aug 30 2012(Updated: )
The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <=5.3.10 | |
PHP | =5.3.0 | |
PHP | =5.3.1 | |
PHP | =5.3.2 | |
PHP | =5.3.3 | |
PHP | =5.3.4 | |
PHP | =5.3.5 | |
PHP | =5.3.6 | |
PHP | =5.3.7 | |
PHP | =5.3.8 | |
PHP | =5.3.9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-1398 has a medium severity level due to its potential to enable HTTP response-splitting attacks.
To fix CVE-2011-1398, upgrade PHP to version 5.3.11 or higher, or 5.4.0RC2 or higher.
CVE-2011-1398 affects PHP versions prior to 5.3.11 and all versions of the 5.4.x branch before 5.4.0RC2.
The implications of CVE-2011-1398 include the risk of remote attackers exploiting the vulnerability to manipulate HTTP headers.
There are no effective workarounds for CVE-2011-1398; upgrading PHP is the recommended solution.