Full Disclosure mailing list archives

Re: PHP fopen() CRLF Injection


From: ulfh () update uu se (Ulf Harnhammar)
Date: Thu, 12 Sep 2002 18:32:36 +0200 (CEST)

This issue has now been fixed in their CVS repository. This is the
patch that they used:

http://cvs.php.net/diff.php/php4/ext/standard/url.c?r1=1.51&r2=1.52&ty=u&Horde=0

// Ulf Harnhammar
ulfh () update uu se
http://www.metaur.nu/


On Mon, 9 Sep 2002, Ulf Harnhammar wrote:

PHP fopen() CRLF Injection


SUMMARY:

fopen(), file() and other functions in PHP have a vulnerability
that makes it possible to add extra HTTP headers to HTTP
queries. Attackers may use it to escape certain restrictions,
like what host to access on a web server. In some cases, this
vulnerability even opens up for arbitrary net connections, turning
some PHP scripts into proxies and open mail relays.



Current thread: