Gravité: : Medium
  Identifiant(s) CVE: : 2011-1398
  Date du conseil: 21 juillet 2015

  Description

The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.

  Information Exposure Rating:

Apply associated Trend Micro DPI Rules.

  Solutions

  Trend Micro Deep Security DPI Rule Name: 1000128 - HTTP Protocol Decoding

  Affected software and version:

  • php php 5.3.0
  • php php 5.3.1
  • php php 5.3.10
  • php php 5.3.2
  • php php 5.3.3
  • php php 5.3.4
  • php php 5.3.5
  • php php 5.3.6
  • php php 5.3.7
  • php php 5.3.8
  • php php 5.3.9