Home

Description

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.

PUBLISHED Reserved 2024-11-15 | Published 2024-11-24 | Updated 2025-11-03 | Assigner php




MEDIUM: 4.8CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

8.1.* (semver) before 8.1.31
affected

8.2.* (semver) before 8.2.26
affected

8.3.* (semver) before 8.3.14
affected

Credits

Lorenzo Leonardini reporter

References

security.netapp.com/advisory/ntap-20241220-0008/

lists.debian.org/debian-lts-announce/2024/12/msg00007.html

github.com/...hp-src/security/advisories/GHSA-c5f2-jwm7-mmq2

cve.org (CVE-2024-11234)

nvd.nist.gov (CVE-2024-11234)

Download JSON