First published: Sun Nov 24 2024(Updated: )
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
Affected Software | Affected Version | How to fix |
---|---|---|
PHP | <8.1.31 | |
PHP | <8.2.26 | |
PHP | <8.3.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-2328523 is classified as a medium severity vulnerability due to its potential for HTTP request smuggling.
To fix REDHAT-BUG-2328523, you should upgrade your PHP installation to versions 8.1.31, 8.2.26, or 8.3.14 or later.
REDHAT-BUG-2328523 affects PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, and 8.3.* before 8.3.14.
HTTP request smuggling in REDHAT-BUG-2328523 occurs when improperly sanitized URIs allow an attacker to manipulate and send unauthorized requests through a proxy.
While upgrading PHP is recommended, temporarily disabling or reconfiguring the use of streams with proxies can mitigate the risk associated with REDHAT-BUG-2328523.