CVE-2024-11234
Published: November 22, 2024Last modified: November 22, 2024
Description
In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.
Severity score breakdown
Parameter | Value |
---|---|
Base score | 7.2 |
Attack Vector | NETWORK |
Attack complexity | LOW |
Privileges required | NONE |
User interaction | NONE |
Scope | CHANGED |
Confidentiality | LOW |
Integrity impact | LOW |
Availability impact | NONE |
Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N |
Status
Product | Release | Package | Status |
---|---|---|---|
Alpaquita Linux | 23 LTS | php81 | Fixed (8.1.31-r0) |
Stream | php83 | Fixed (8.3.14-r0) |