{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2024-11234","assignerOrgId":"dd77f84a-d19a-4638-8c3d-a322d820ed2b","state":"PUBLISHED","assignerShortName":"php","dateReserved":"2024-11-15T06:26:08.361Z","datePublished":"2024-11-24T00:57:39.349Z","dateUpdated":"2025-11-03T21:51:51.580Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"PHP","vendor":"PHP Group","versions":[{"lessThan":"8.1.31","status":"affected","version":"8.1.*","versionType":"semver"},{"lessThan":"8.2.26","status":"affected","version":"8.2.*","versionType":"semver"},{"lessThan":"8.3.14","status":"affected","version":"8.3.*","versionType":"semver"}]}],"credits":[{"lang":"en","type":"reporter","value":"Lorenzo Leonardini"}],"datePublic":"2024-11-21T18:15:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<span style=\"background-color: rgb(255, 255, 255);\">In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and \"request_fulluri\" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user.&nbsp;</span><br>"}],"value":"In PHP versions 8.1.* before 8.1.31, 8.2.* before 8.2.26, 8.3.* before 8.3.14, when using streams with configured proxy and \"request_fulluri\" option, the URI is not properly sanitized which can lead to HTTP request smuggling and allow the attacker to use the proxy to perform arbitrary HTTP requests originating from the server, thus potentially gaining access to resources not normally available to the external user."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.8,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-20","description":"CWE-20 Improper Input Validation","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"dd77f84a-d19a-4638-8c3d-a322d820ed2b","shortName":"php","dateUpdated":"2024-11-24T00:57:39.349Z"},"references":[{"url":"https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm7-mmq2"}],"source":{"advisory":"https://github.com/php/php-src/security/advisories/GHSA-c5f2-jwm","discovery":"EXTERNAL"},"title":"Configuring a proxy in a stream context might allow for CRLF injection in URIs","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-11234","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"version":"2.0.3","timestamp":"2024-11-24T12:32:39.294616Z"}}}],"affected":[{"cpes":["cpe:2.3:a:php_group:php:*:*:*:*:*:*:*:*"],"vendor":"php_group","product":"php","versions":[{"status":"affected","version":"8.1.0","lessThan":"8.1.31","versionType":"custom"},{"status":"affected","version":"8.2.0","lessThan":"8.2.26","versionType":"custom"},{"status":"affected","version":"8.3.0","lessThan":"8.3.14","versionType":"custom"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:php_group:php:*:*:*:*:*:*:*:*"],"vendor":"php_group","product":"php","versions":[{"status":"affected","version":"8.1.0","lessThan":"8.1.31","versionType":"custom"},{"status":"affected","version":"8.2.0","lessThan":"8.2.26","versionType":"custom"},{"status":"affected","version":"8.3.0","lessThan":"8.3.14","versionType":"custom"}],"defaultStatus":"unknown"},{"cpes":["cpe:2.3:a:php_group:php:*:*:*:*:*:*:*:*"],"vendor":"php_group","product":"php","versions":[{"status":"affected","version":"8.1.0","lessThan":"8.1.31","versionType":"custom"},{"status":"affected","version":"8.2.0","lessThan":"8.2.26","versionType":"custom"},{"status":"affected","version":"8.3.0","lessThan":"8.3.14","versionType":"custom"}],"defaultStatus":"unknown"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-24T12:41:42.763Z"}},{"title":"CVE Program Container","references":[{"url":"https://security.netapp.com/advisory/ntap-20241220-0008/"},{"url":"https://lists.debian.org/debian-lts-announce/2024/12/msg00007.html"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-03T21:51:51.580Z"}}]}}