We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-11234

Configuring a proxy in a stream context might allow for CRLF injection in URIs



Description

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.

Reserved 2024-11-15 | Published 2024-11-24 | Updated 2024-11-24 | Assigner php


MEDIUM: 4.8CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

8.1.* before 8.1.31
affected

8.2.* before 8.2.26
affected

8.3.* before 8.3.14
affected

Credits

Lorenzo Leonardini reporter

References

github.com/...hp-src/security/advisories/GHSA-c5f2-jwm7-mmq2

cve.org (CVE-2024-11234)

nvd.nist.gov (CVE-2024-11234)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-11234

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.