CVE-2011-1398

Impact:
Moderate
Public Date:
2011-11-06
Bugzilla:
853329: CVE-2011-1398 PHP: sapi_header_op() %0D sequence handling security bypass

The MITRE CVE dictionary describes this issue as:

The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.

Find out more about CVE-2011-1398 from the MITRE CVE dictionary dictionary and NIST NVD.

CVSS v2 metrics

Base Score 4.3
Base Metrics AV:N/AC:M/Au:N/C:N/I:P/A:N
Access Vector Network
Access Complexity Medium
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None

Find out more about Red Hat support for the Common Vulnerability Scoring System (CVSS).

Red Hat Security Errata

Platform Errata Release Date
Red Hat Enterprise Linux 5 (php) RHSA-2013:1814 2013-12-11
Red Hat Enterprise Linux 6 (php) RHSA-2013:0514 2013-02-20
Red Hat Enterprise Linux 5 (php53) RHSA-2013:1307 2013-09-30
Last Modified

CVE description copyright © 2017, The MITRE Corporation