Описание
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
A flaw was found in PHP. In affected versions of PHP, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized, which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not usually available to the external user.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 7 | php | Out of support scope | ||
Red Hat Enterprise Linux 8 | php:7.4/php | Will not fix | ||
Red Hat Enterprise Linux 8 | php:8.0/php | Will not fix | ||
Red Hat Enterprise Linux 8 | php:8.2/php | Fix deferred | ||
Red Hat Enterprise Linux 9 | php | Fixed | RHSA-2025:4263 | 28.04.2025 |
Red Hat Enterprise Linux 9 | php | Fixed | RHSA-2025:7315 | 13.05.2025 |
Red Hat Enterprise Linux 9 | php | Fixed | RHSA-2025:7432 | 13.05.2025 |
Показывать по
Дополнительная информация
Статус:
4.8 Medium
CVSS3
Связанные уязвимости
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before ...
Configuring a proxy in a stream context might allow for CRLF injection in URIs
4.8 Medium
CVSS3