In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
History

Tue, 26 Nov 2024 19:30:00 +0000

Type Values Removed Values Added
First Time appeared Php
Php php
Weaknesses CWE-74
CPEs cpe:2.3:a:php:php:*:*:*:*:*:*:*:*
Vendors & Products Php
Php php

Mon, 25 Nov 2024 14:00:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Sun, 24 Nov 2024 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Php Group
Php Group php
CPEs cpe:2.3:a:php_group:php:*:*:*:*:*:*:*:*
Vendors & Products Php Group
Php Group php
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 24 Nov 2024 01:15:00 +0000

Type Values Removed Values Added
Description In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
Title Configuring a proxy in a stream context might allow for CRLF injection in URIs
Weaknesses CWE-20
References
Metrics cvssV3_1

{'score': 4.8, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: php

Published: 2024-11-24T00:57:39.349Z

Updated: 2024-11-24T12:41:42.763Z

Reserved: 2024-11-15T06:26:08.361Z

Link: CVE-2024-11234

cve-icon Vulnrichment

Updated: 2024-11-24T12:32:12.132Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-24T01:15:03.987

Modified: 2024-11-26T19:06:10.243

Link: CVE-2024-11234

cve-icon Redhat

Severity : Moderate

Publid Date: 2024-11-24T00:57:39Z

Links: CVE-2024-11234 - Bugzilla