Bug 2328523 (CVE-2024-11234)
Summary: | CVE-2024-11234 php: Configuring a proxy in a stream context might allow for CRLF injection in URIs | ||
---|---|---|---|
Product: | [Other] Security Response | Reporter: | OSIDB Bzimport <bzimport> |
Component: | vulnerability | Assignee: | Product Security DevOps Team <prodsec-dev> |
Status: | NEW --- | QA Contact: | |
Severity: | medium | Docs Contact: | |
Priority: | medium | ||
Version: | unspecified | CC: | kyoshida, vrajput |
Target Milestone: | --- | Keywords: | Security |
Target Release: | --- | ||
Hardware: | All | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | If docs needed, set a value | |
Doc Text: |
A flaw was found in PHP. In affected versions of PHP, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized, which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not usually available to the external user.
|
Story Points: | --- |
Clone Of: | Environment: | ||
Last Closed: | Type: | --- | |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: | |||
Bug Depends On: | 2328613, 2328614, 2328615 | ||
Bug Blocks: |
Description
OSIDB Bzimport
2024-11-24 02:01:12 UTC
This issue has been addressed in the following products: Red Hat Enterprise Linux 9 Via RHSA-2025:4263 https://access.redhat.com/errata/RHSA-2025:4263 |