Improper Input Validation Affecting php package, versions [,5.4.0]


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.21% (59th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-PHP-2335192
  • published12 Jan 2022
  • disclosed7 Sept 2012
  • creditUnknown

Introduced: 7 Sep 2012

CVE-2012-4388  (opens in a new tab)
CWE-20  (opens in a new tab)

How to fix?

There is no fixed version for php.

Overview

Affected versions of this package are vulnerable to Improper Input Validation. The sapi_header_op function in main/SAPI.c in PHP 5.4.0RC2 through 5.4.0 does not properly determine a pointer during checks for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1398.

References

CVSS Scores

version 3.1