29 Aoû 2012
Vulnerability Details : CVE-2011-1398
The sapi_header_op function in main/SAPI.c in PHP before 5.3.11 and 5.4.x before 5.4.0RC2 does not check for %0D sequences (aka carriage return characters), which allows remote attackers to bypass an HTTP response-splitting protection mechanism via a crafted URL, related to improper interaction between the PHP header function and certain browsers, as demonstrated by Internet Explorer and Google Chrome.
Publish Date : 2012-08-30 Last Update Date : 2013-10-10
- CVSS Scores & Vulnerability Types
- Related OVAL Definitions
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability.
- Products Affected By CVE-2011-1398
- Number Of Affected Versions By Product
- References For CVE-2011-1398
- Metasploit Modules Related To CVE-2011-1398
There are not any metasploit modules related to this vulnerability (Please visit www.metasploit.com for more information)