First published: Thu Nov 21 2024(Updated: )
Fixed bug (Configuring a proxy in a stream context might allow for CRLF injection in URIs). (CVE-2024-11234)
Credit: security@php.net security@php.net
Affected Software | Affected Version | How to fix |
---|---|---|
debian/php7.4 | <=7.4.33-1+deb11u5 | 7.4.33-1+deb11u7 |
debian/php8.2 | 8.2.26-1~deb12u1 8.2.27-1 | |
PHP | >=8.1.0<8.1.31 | |
PHP | >=8.2.0<8.2.26 | |
PHP | >=8.3.0<8.3.14 | |
PHP | <8.1.31 | 8.1.31 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11234 has been classified as a medium severity vulnerability due to the potential for CRLF injection in URIs.
To fix CVE-2024-11234, upgrade PHP to version 8.1.31 or higher, or to versions 8.2.26 or higher, or 8.3.14 or higher.
CVE-2024-11234 affects PHP versions 8.1.0 to 8.1.30, 8.2.0 to 8.2.25, and 8.3.0 to 8.3.13.
This vulnerability allows for CRLF injection attacks which can lead to HTTP response splitting.
There are no known workarounds for CVE-2024-11234; upgrading to a patched version is recommended.