This issue has now been fixed in their CVS repository. This is the
patch that they used:

http://cvs.php.net/diff.php/php4/ext/standard/url.c?r1=1.51&r2=1.52&ty=u&Horde=0

// Ulf Harnhammar
[EMAIL PROTECTED]
http://www.metaur.nu/


On Mon, 9 Sep 2002, Ulf Harnhammar wrote:

> PHP fopen() CRLF Injection
> 
> 
> SUMMARY:
> 
> fopen(), file() and other functions in PHP have a vulnerability
> that makes it possible to add extra HTTP headers to HTTP
> queries. Attackers may use it to escape certain restrictions,
> like what host to access on a web server. In some cases, this
> vulnerability even opens up for arbitrary net connections, turning
> some PHP scripts into proxies and open mail relays.

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.netsys.com/full-disclosure-charter.html

Reply via email to