CRLF injection vulnerability in PHP 4.2.1 up to and including 4.2.3, when allow_url_fopen is enabled, allows remote malicious users to modify HTTP headers for outgoing requests by causing CRLF sequences to be injected into arguments that are passed to the (1) fopen or (2) file functions.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
php php 3.0.14 |
||
php php 3.0.15 |
||
php php 4.0.6 |
||
php php 4.0.7 |
||
php php 4.2.3 |
||
php php 3.0.18 |
||
php php 4.0.3 |
||
php php 4.1.2 |
||
php php 4.2.0 |
||
php php 4.0.4 |
||
php php 4.0.5 |
||
php php 4.2.1 |
||
php php 4.2.2 |
||
php php 3.0.16 |
||
php php 3.0.17 |
||
php php 4.1.0 |
||
php php 4.1.1 |