CVE-2002-1783

CRLF injection vulnerability in PHP 4.2.1 through 4.2.3, when allow_url_fopen is enabled, allows remote attackers to modify HTTP headers for outgoing requests by causing CRLF sequences to be injected into arguments that are passed to the (1) fopen or (2) file functions.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:php:php:3.0.14:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.15:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.16:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.17:*:*:*:*:*:*:*
cpe:2.3:a:php:php:3.0.18:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.5:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.6:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.0.7:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.0:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:php:php:4.2.3:*:*:*:*:*:*:*

History

20 Nov 2024, 23:42

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/bugtraq/2002-09/0086.html - Vendor Advisory () http://archives.neohapsis.com/archives/bugtraq/2002-09/0086.html - Vendor Advisory
References () http://archives.neohapsis.com/archives/bugtraq/2002-09/0132.html - Patch () http://archives.neohapsis.com/archives/bugtraq/2002-09/0132.html - Patch
References () http://www.debian.org/security/2002/dsa-168 - Patch, Vendor Advisory () http://www.debian.org/security/2002/dsa-168 - Patch, Vendor Advisory
References () http://www.securityfocus.com/bid/5681 - Patch () http://www.securityfocus.com/bid/5681 - Patch
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/10080 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/10080 -

Information

Published : 2002-12-31 05:00

Updated : 2024-11-20 23:42


NVD link : CVE-2002-1783

Mitre link : CVE-2002-1783

CVE.ORG link : CVE-2002-1783


JSON object : View

Products Affected

php

  • php