CVE-2024-11234

Source
https://nvd.nist.gov/vuln/detail/CVE-2024-11234
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-11234.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-11234
Aliases
Downstream
Related
Published
2024-11-24T01:15:03Z
Modified
2025-10-14T15:33:36Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and "request_fulluri" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.

References

Affected packages

Git / github.com/php/php-src

Affected ranges

Type
GIT
Repo
https://github.com/php/php-src
Events